Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.54.242.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.54.242.204.			IN	A

;; AUTHORITY SECTION:
.			511	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023061702 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 18 09:35:18 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 204.242.54.34.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 204.242.54.34.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
113.57.170.50 attack
Jul  4 15:53:58 pkdns2 sshd\[14218\]: Failed password for root from 113.57.170.50 port 38595 ssh2Jul  4 15:56:57 pkdns2 sshd\[14380\]: Invalid user postgres from 113.57.170.50Jul  4 15:56:59 pkdns2 sshd\[14380\]: Failed password for invalid user postgres from 113.57.170.50 port 48389 ssh2Jul  4 16:00:09 pkdns2 sshd\[14557\]: Invalid user qswang from 113.57.170.50Jul  4 16:00:11 pkdns2 sshd\[14557\]: Failed password for invalid user qswang from 113.57.170.50 port 35950 ssh2Jul  4 16:03:17 pkdns2 sshd\[14668\]: Failed password for root from 113.57.170.50 port 36777 ssh2
...
2020-07-04 21:37:52
12.118.161.118 attackspambots
TCP src-port=44663   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (151)
2020-07-04 21:57:54
173.201.196.115 attackspambots
Automatic report - XMLRPC Attack
2020-07-04 22:02:39
119.2.17.138 attackbots
Jul  4 15:46:51 vps333114 sshd[23973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.2.17.138
Jul  4 15:46:53 vps333114 sshd[23973]: Failed password for invalid user confluence from 119.2.17.138 port 46504 ssh2
...
2020-07-04 21:42:54
112.85.42.172 attackbotsspam
Jul  4 14:28:19 ajax sshd[24683]: Failed password for root from 112.85.42.172 port 12707 ssh2
Jul  4 14:28:24 ajax sshd[24683]: Failed password for root from 112.85.42.172 port 12707 ssh2
2020-07-04 21:30:32
184.105.247.246 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-04 21:36:34
170.130.143.4 attack
TCP src-port=41271   dst-port=25   Listed on   zen-spamhaus spam-sorbs anonmails-de       (Project Honey Pot rated Suspicious)   (150)
2020-07-04 22:01:34
145.239.88.43 attack
Jul  4 14:13:00 rocket sshd[24660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.88.43
Jul  4 14:13:02 rocket sshd[24660]: Failed password for invalid user pav from 145.239.88.43 port 59866 ssh2
...
2020-07-04 21:23:48
5.53.124.239 attackspam
Jul  4 20:18:04 webhost01 sshd[31666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.53.124.239
Jul  4 20:18:06 webhost01 sshd[31666]: Failed password for invalid user cust from 5.53.124.239 port 52498 ssh2
...
2020-07-04 21:24:37
58.8.208.54 attack
Automatic report - Port Scan Attack
2020-07-04 21:35:57
150.129.8.11 attackbotsspam
WordPress user registration, really-simple-captcha js check bypass
2020-07-04 21:53:32
142.44.218.192 attackspam
Jul  4 14:41:17 gestao sshd[7416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192 
Jul  4 14:41:19 gestao sshd[7416]: Failed password for invalid user uftp from 142.44.218.192 port 55392 ssh2
Jul  4 14:45:17 gestao sshd[7460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192 
...
2020-07-04 21:55:25
106.13.233.102 attackspambots
Jul  4 14:13:20 jane sshd[17517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.102 
Jul  4 14:13:21 jane sshd[17517]: Failed password for invalid user archiva from 106.13.233.102 port 53756 ssh2
...
2020-07-04 21:33:37
104.248.159.69 attackbotsspam
Jul  4 15:13:37 sso sshd[17105]: Failed password for root from 104.248.159.69 port 48334 ssh2
...
2020-07-04 21:49:20
184.105.247.224 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-04 21:49:56

Recently Reported IPs

68.75.75.137 213.87.129.166 164.140.38.209 37.130.123.98
112.215.235.10 39.69.102.134 176.58.103.156 127.24.125.144
191.30.155.236 199.25.244.187 22.34.40.5 82.52.132.247
21.247.120.212 13.125.151.163 13.90.216.79 94.240.78.208
204.120.89.226 1.192.247.71 234.150.227.97 110.63.153.44