Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.67.53.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.67.53.134.			IN	A

;; AUTHORITY SECTION:
.			454	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091902 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 20 12:55:24 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 134.53.67.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.53.67.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.54.50.232 attack
2019-11-22T22:52:18.738030shield sshd\[8957\]: Invalid user admin from 106.54.50.232 port 52942
2019-11-22T22:52:18.742199shield sshd\[8957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.50.232
2019-11-22T22:52:21.018126shield sshd\[8957\]: Failed password for invalid user admin from 106.54.50.232 port 52942 ssh2
2019-11-22T22:56:21.846042shield sshd\[10815\]: Invalid user ident from 106.54.50.232 port 60076
2019-11-22T22:56:21.850456shield sshd\[10815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.50.232
2019-11-23 07:10:11
121.231.214.121 attack
badbot
2019-11-23 07:26:52
208.113.210.246 attackspambots
208.113.210.246 - - \[22/Nov/2019:23:56:01 +0100\] "POST /wp-login.php HTTP/1.0" 200 6655 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
208.113.210.246 - - \[22/Nov/2019:23:56:04 +0100\] "POST /wp-login.php HTTP/1.0" 200 6493 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
208.113.210.246 - - \[22/Nov/2019:23:56:08 +0100\] "POST /wp-login.php HTTP/1.0" 200 6492 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-23 07:18:53
123.201.20.30 attackspam
Nov 23 01:55:23 server sshd\[24556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.20.30  user=root
Nov 23 01:55:25 server sshd\[24556\]: Failed password for root from 123.201.20.30 port 47838 ssh2
Nov 23 02:10:13 server sshd\[28304\]: Invalid user ident from 123.201.20.30
Nov 23 02:10:13 server sshd\[28304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.20.30 
Nov 23 02:10:15 server sshd\[28304\]: Failed password for invalid user ident from 123.201.20.30 port 36197 ssh2
...
2019-11-23 07:18:33
183.149.46.168 attackspam
badbot
2019-11-23 07:29:14
182.247.61.14 attackbotsspam
badbot
2019-11-23 07:05:53
37.139.24.190 attack
$f2bV_matches
2019-11-23 06:53:09
5.39.67.154 attackbots
Nov 23 04:16:58 gw1 sshd[27320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.67.154
Nov 23 04:16:59 gw1 sshd[27320]: Failed password for invalid user punessen from 5.39.67.154 port 38613 ssh2
...
2019-11-23 07:28:39
112.64.170.178 attack
Nov 22 23:52:49 OPSO sshd\[17507\]: Invalid user webadmin from 112.64.170.178 port 3378
Nov 22 23:52:49 OPSO sshd\[17507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.170.178
Nov 22 23:52:51 OPSO sshd\[17507\]: Failed password for invalid user webadmin from 112.64.170.178 port 3378 ssh2
Nov 22 23:56:29 OPSO sshd\[18479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.170.178  user=root
Nov 22 23:56:31 OPSO sshd\[18479\]: Failed password for root from 112.64.170.178 port 22240 ssh2
2019-11-23 07:00:08
46.101.224.184 attackbotsspam
Invalid user vc from 46.101.224.184 port 40822
2019-11-23 06:51:15
138.201.202.95 attackbotsspam
138.201.202.95 was recorded 5 times by 2 hosts attempting to connect to the following ports: 2375,2376,2377. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-23 06:58:47
170.0.32.130 attack
" "
2019-11-23 07:25:28
182.34.215.211 attackspam
badbot
2019-11-23 06:59:32
221.186.182.226 attackbots
Repeated brute force against a port
2019-11-23 07:26:25
183.131.184.27 attackbots
Automatic report - Port Scan Attack
2019-11-23 07:13:01

Recently Reported IPs

125.227.48.251 23.231.189.138 172.88.82.91 112.111.109.119
24.236.62.170 1.80.146.19 160.136.111.203 36.65.123.99
24.137.214.74 111.101.172.2 177.39.23.56 223.104.233.128
159.206.191.71 200.31.21.55 223.31.12.34 2.196.217.116
2.244.58.143 181.180.18.72 1.52.191.255 70.127.12.178