Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.57.7.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.57.7.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:53:18 CST 2025
;; MSG SIZE  rcvd: 104
Host info
159.7.57.34.in-addr.arpa domain name pointer 159.7.57.34.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.7.57.34.in-addr.arpa	name = 159.7.57.34.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
108.59.0.103 attackspam
108.59.0.103 was recorded 5 times by 4 hosts attempting to connect to the following ports: 16050,26050. Incident counter (4h, 24h, all-time): 5, 16, 59
2020-07-15 20:37:03
185.220.101.243 attackspam
Automatic report - Banned IP Access
2020-07-15 20:40:02
118.71.190.9 attackbotsspam
Unauthorized connection attempt from IP address 118.71.190.9 on Port 445(SMB)
2020-07-15 20:27:35
183.82.96.185 attackbotsspam
Unauthorized connection attempt from IP address 183.82.96.185 on Port 445(SMB)
2020-07-15 20:23:28
122.51.14.236 attackspambots
Invalid user moni from 122.51.14.236 port 45112
2020-07-15 20:27:02
192.241.237.57 attackspambots
192.241.237.57 - - [15/Jul/2020:06:04:24 -0500] "GET https://www.ad5gb.com/ HTTP/1.1" 400 346 000 0 0 0 130 295 0 0 0 NONE FIN FIN ERR_INVALID_REQ
2020-07-15 20:12:57
187.95.42.186 attackbots
Unauthorized connection attempt from IP address 187.95.42.186 on Port 445(SMB)
2020-07-15 20:46:17
115.73.213.11 attack
Unauthorized connection attempt from IP address 115.73.213.11 on Port 445(SMB)
2020-07-15 20:41:00
40.79.87.230 attackspambots
Jul 15 12:52:51 rancher-0 sshd[335140]: Invalid user admin from 40.79.87.230 port 24984
...
2020-07-15 20:14:43
60.216.46.77 attackbotsspam
Jul 15 17:15:33 itv-usvr-01 sshd[7505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.216.46.77  user=root
Jul 15 17:15:35 itv-usvr-01 sshd[7505]: Failed password for root from 60.216.46.77 port 37197 ssh2
2020-07-15 20:12:05
192.241.208.6 attackbotsspam
Port probing on unauthorized port 115
2020-07-15 20:22:40
46.38.150.142 attackspam
2020-07-15T06:22:00.184524linuxbox-skyline auth[988231]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=support321 rhost=46.38.150.142
...
2020-07-15 20:25:26
47.52.239.42 attack
47.52.239.42 - - \[15/Jul/2020:13:40:02 +0200\] "POST /wp-login.php HTTP/1.0" 200 6400 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
47.52.239.42 - - \[15/Jul/2020:13:40:05 +0200\] "POST /wp-login.php HTTP/1.0" 200 6412 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
47.52.239.42 - - \[15/Jul/2020:13:40:08 +0200\] "POST /wp-login.php HTTP/1.0" 200 6404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-15 20:30:52
188.166.244.121 attackspam
Jul 15 12:02:22 plex-server sshd[1438009]: Invalid user jhernandez from 188.166.244.121 port 55741
Jul 15 12:02:22 plex-server sshd[1438009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.244.121 
Jul 15 12:02:22 plex-server sshd[1438009]: Invalid user jhernandez from 188.166.244.121 port 55741
Jul 15 12:02:24 plex-server sshd[1438009]: Failed password for invalid user jhernandez from 188.166.244.121 port 55741 ssh2
Jul 15 12:06:47 plex-server sshd[1440712]: Invalid user caj from 188.166.244.121 port 54039
...
2020-07-15 20:15:49
129.204.235.54 attackspam
Invalid user ts3bot from 129.204.235.54 port 49384
2020-07-15 20:20:59

Recently Reported IPs

225.147.19.231 190.173.80.51 71.36.56.100 89.36.123.22
84.67.142.181 143.246.112.124 245.84.220.173 118.241.246.60
166.83.173.218 13.114.238.245 54.165.239.170 12.213.44.79
78.124.175.174 23.179.17.50 180.114.105.112 155.154.241.153
32.128.58.115 66.231.130.175 72.222.60.167 95.214.134.199