Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.57.121.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23034
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.57.121.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:32:34 CST 2025
;; MSG SIZE  rcvd: 106
Host info
143.121.57.34.in-addr.arpa domain name pointer 143.121.57.34.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.121.57.34.in-addr.arpa	name = 143.121.57.34.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.35 attack
Jul 12 06:39:31 abendstille sshd\[13552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Jul 12 06:39:33 abendstille sshd\[13552\]: Failed password for root from 222.186.30.35 port 17872 ssh2
Jul 12 06:39:37 abendstille sshd\[13552\]: Failed password for root from 222.186.30.35 port 17872 ssh2
Jul 12 06:39:39 abendstille sshd\[13552\]: Failed password for root from 222.186.30.35 port 17872 ssh2
Jul 12 06:39:40 abendstille sshd\[13895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
...
2020-07-12 12:48:02
180.215.223.146 attackspambots
Jul 12 05:55:59 nextcloud sshd\[27666\]: Invalid user luquanfeng from 180.215.223.146
Jul 12 05:55:59 nextcloud sshd\[27666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.215.223.146
Jul 12 05:56:02 nextcloud sshd\[27666\]: Failed password for invalid user luquanfeng from 180.215.223.146 port 54486 ssh2
2020-07-12 12:38:26
134.175.126.72 attack
2020-07-12T05:47:21.337083amanda2.illicoweb.com sshd\[31959\]: Invalid user yxsa from 134.175.126.72 port 35966
2020-07-12T05:47:21.343276amanda2.illicoweb.com sshd\[31959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.126.72
2020-07-12T05:47:23.524155amanda2.illicoweb.com sshd\[31959\]: Failed password for invalid user yxsa from 134.175.126.72 port 35966 ssh2
2020-07-12T05:56:33.337946amanda2.illicoweb.com sshd\[32547\]: Invalid user raju from 134.175.126.72 port 46310
2020-07-12T05:56:33.342643amanda2.illicoweb.com sshd\[32547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.126.72
...
2020-07-12 12:17:41
45.125.65.52 attackspam
Jul 12 06:13:33 srv01 postfix/smtpd\[27989\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 06:14:19 srv01 postfix/smtpd\[20054\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 06:15:40 srv01 postfix/smtpd\[20054\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 06:16:28 srv01 postfix/smtpd\[20726\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 06:20:17 srv01 postfix/smtpd\[13793\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-12 12:31:42
112.85.42.229 attackspam
Jul 12 06:41:39 home sshd[5783]: Failed password for root from 112.85.42.229 port 56225 ssh2
Jul 12 06:41:46 home sshd[5783]: Failed password for root from 112.85.42.229 port 56225 ssh2
Jul 12 06:42:33 home sshd[5877]: Failed password for root from 112.85.42.229 port 33268 ssh2
...
2020-07-12 12:43:12
202.131.225.178 attackspam
20/7/11@23:56:07: FAIL: Alarm-Network address from=202.131.225.178
20/7/11@23:56:07: FAIL: Alarm-Network address from=202.131.225.178
...
2020-07-12 12:34:56
94.23.172.28 attackspam
SSH bruteforce
2020-07-12 12:23:17
206.189.88.253 attack
$f2bV_matches
2020-07-12 12:23:30
123.200.10.42 attackspam
Jul 12 05:56:26 debian-2gb-nbg1-2 kernel: \[16784766.861053\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=123.200.10.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=29924 PROTO=TCP SPT=40960 DPT=27035 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-12 12:23:00
193.112.54.190 attackbotsspam
Jul 11 18:23:25 hpm sshd\[18464\]: Invalid user phyliss from 193.112.54.190
Jul 11 18:23:25 hpm sshd\[18464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.54.190
Jul 11 18:23:27 hpm sshd\[18464\]: Failed password for invalid user phyliss from 193.112.54.190 port 39702 ssh2
Jul 11 18:26:14 hpm sshd\[18668\]: Invalid user battlefield from 193.112.54.190
Jul 11 18:26:14 hpm sshd\[18668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.54.190
2020-07-12 12:52:17
39.59.2.49 attackbotsspam
IP 39.59.2.49 attacked honeypot on port: 8080 at 7/11/2020 8:56:00 PM
2020-07-12 12:26:20
221.217.227.86 attackbotsspam
Jul 12 05:47:55 server sshd[25652]: Failed password for invalid user lumeiqi from 221.217.227.86 port 24385 ssh2
Jul 12 05:50:57 server sshd[28542]: Failed password for invalid user torus from 221.217.227.86 port 19265 ssh2
Jul 12 05:56:37 server sshd[2944]: Failed password for invalid user dexter from 221.217.227.86 port 30561 ssh2
2020-07-12 12:14:15
194.204.194.11 attack
Jul 12 05:53:42 srv-ubuntu-dev3 sshd[72411]: Invalid user siva from 194.204.194.11
Jul 12 05:53:42 srv-ubuntu-dev3 sshd[72411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11
Jul 12 05:53:42 srv-ubuntu-dev3 sshd[72411]: Invalid user siva from 194.204.194.11
Jul 12 05:53:44 srv-ubuntu-dev3 sshd[72411]: Failed password for invalid user siva from 194.204.194.11 port 45784 ssh2
Jul 12 05:57:00 srv-ubuntu-dev3 sshd[72941]: Invalid user gaobz from 194.204.194.11
Jul 12 05:57:00 srv-ubuntu-dev3 sshd[72941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11
Jul 12 05:57:00 srv-ubuntu-dev3 sshd[72941]: Invalid user gaobz from 194.204.194.11
Jul 12 05:57:02 srv-ubuntu-dev3 sshd[72941]: Failed password for invalid user gaobz from 194.204.194.11 port 43086 ssh2
Jul 12 06:00:17 srv-ubuntu-dev3 sshd[73476]: Invalid user www from 194.204.194.11
...
2020-07-12 12:27:14
125.213.128.52 attackbots
Jul 12 05:56:36 mout sshd[32165]: Invalid user zhouheng from 125.213.128.52 port 48954
Jul 12 05:56:38 mout sshd[32165]: Failed password for invalid user zhouheng from 125.213.128.52 port 48954 ssh2
Jul 12 05:56:38 mout sshd[32165]: Disconnected from invalid user zhouheng 125.213.128.52 port 48954 [preauth]
2020-07-12 12:13:23
198.20.70.114 attackbots
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 11
2020-07-12 12:35:51

Recently Reported IPs

198.217.205.30 78.72.157.229 82.144.73.204 133.166.40.27
46.23.21.178 220.102.170.21 253.172.210.170 126.254.119.92
120.200.153.155 53.135.214.89 255.27.155.42 194.71.209.194
47.76.13.72 134.13.60.112 37.209.240.211 121.213.200.53
62.30.226.123 190.121.198.151 164.62.239.61 198.43.230.83