Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.9.9.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47049
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.9.9.53.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102500 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 26 00:55:09 CST 2023
;; MSG SIZE  rcvd: 102
Host info
Host 53.9.9.34.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 53.9.9.34.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
212.170.50.203 attackbotsspam
Mar 27 05:52:44 mail sshd\[3942\]: Invalid user jrp from 212.170.50.203
Mar 27 05:52:44 mail sshd\[3942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.170.50.203
Mar 27 05:52:46 mail sshd\[3942\]: Failed password for invalid user jrp from 212.170.50.203 port 39950 ssh2
...
2020-03-27 19:12:14
198.108.67.53 attack
Mar 27 11:31:54 debian-2gb-nbg1-2 kernel: \[7564185.304254\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.53 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=29 ID=27479 PROTO=TCP SPT=57709 DPT=23 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-27 18:41:07
185.200.118.48 attack
scans once in preceeding hours on the ports (in chronological order) 1080 resulting in total of 9 scans from 185.200.118.0/24 block.
2020-03-27 18:43:59
92.118.37.86 attack
[MK-VM2] Blocked by UFW
2020-03-27 19:02:39
37.49.227.109 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 41794 6881
2020-03-27 19:11:35
185.153.198.211 attackspambots
03/27/2020-05:55:38.447963 185.153.198.211 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-27 18:52:54
83.97.20.49 attack
firewall-block, port(s): 82/tcp, 5555/tcp, 9080/tcp, 9999/tcp, 10000/tcp
2020-03-27 19:04:20
122.228.19.80 attack
firewall-block, port(s): 990/tcp, 6667/tcp
2020-03-27 18:59:59
71.6.146.185 attack
Unauthorized connection attempt detected from IP address 71.6.146.185 to port 5984
2020-03-27 19:07:49
198.108.66.43 attackbotsspam
firewall-block, port(s): 27017/tcp
2020-03-27 18:42:29
94.102.49.193 attackbots
Automatic report - Banned IP Access
2020-03-27 19:00:49
185.156.73.54 attackbotsspam
Mar 27 11:09:15 debian-2gb-nbg1-2 kernel: \[7562826.678276\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.54 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=20198 PROTO=TCP SPT=56827 DPT=3331 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-27 18:13:55
111.68.104.156 attackbots
Invalid user wink from 111.68.104.156 port 31495
2020-03-27 19:14:43
89.248.172.85 attack
scans 19 times in preceeding hours on the ports (in chronological order) 3060 60999 4066 3224 3980 55100 34569 34381 34030 4646 5009 5015 4747 34381 5048 5020 34019 5105 5084 resulting in total of 199 scans from 89.248.160.0-89.248.174.255 block.
2020-03-27 19:03:13
89.144.47.246 attack
scans 2 times in preceeding hours on the ports (in chronological order) 3389 3389
2020-03-27 18:29:50

Recently Reported IPs

62.110.253.62 17.53.24.252 210.232.81.4 15.167.110.106
217.38.0.168 96.121.104.98 232.19.42.22 190.124.18.116
231.17.197.234 204.233.47.169 78.240.239.107 140.14.9.26
131.32.11.254 64.68.189.38 201.141.93.2 235.31.55.190
157.122.21.30 104.176.39.87 20.175.97.246 114.231.74.117