Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.137.54.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.137.54.170.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 23:13:07 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 170.54.137.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 170.54.137.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.220.206.28 spambotsattackproxy
http://91.220.206.28/  Взламывает страницы в контакте!!!! ПРИМИТЕ МЕРЫ ПО ПРИВЛЕЧЕНИЮ К ответственности!!!
2021-02-01 07:07:10
124.158.112.70 spambotsattackproxynormal
Download program
2021-01-25 16:57:00
185.63.253.200 attack
2021-01-23 04:57:24
69.65.62.91 spamattack
PHISHING ATTACK
123Greetings - specials@123g.biz: 
"Easy Trick 'Removes' Your Eye Bags & Wrinkles (Do This Tonight)":
from mail.silver91.123g.biz ([69.65.62.91]:54889):
Tue, 26 Jan 2021 09:30:35 +1100
NOTE pretending to be -123Greetings.com- DANGEROUS don't be fooled
2021-01-28 05:59:37
156.178.60.184 attack
55
2021-02-08 06:45:49
185.63.253.200 bots
Bokep
2021-01-14 01:43:27
213.108.134.156 attack
PP2P Brute-Force, RDP Brute-Force
2021-01-27 16:31:27
47.146.111.179 normal
Some one stole my device it's here can you help me
2021-01-21 16:00:48
129.134.0.0 attack
NetRange:       129.134.0.0 - 129.134.255.255
CIDR:           129.134.0.0/16
NetName:        THEFA-3
NetHandle:      NET-129-134-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Direct Assignment
OriginAS:       
Organization:   Facebook, Inc. (THEFA-3)
RegDate:        2015-05-13
Updated:        2015-05-13
Ref:            https://rdap.arin.net/registry/ip/129.134.0.0

OrgName:        Facebook, Inc.
OrgId:          THEFA-3
Address:        1601 Willow Rd.
City:           Menlo Park
StateProv:      CA
PostalCode:     94025
Country:        US
RegDate:        2004-08-11
Updated:        2012-04-17
Ref:            https://rdap.arin.net/registry/entity/THEFA-3

OrgAbuseHandle: OPERA82-ARIN
OrgAbuseName:   Operations
2021-01-13 08:40:50
116.206.12.48 spambotsattackproxynormal
Hack facebook
2021-01-12 13:59:03
47.146.111.179 normal
Some one stole my device it's here can you help me
2021-01-21 16:00:46
49.145.234.155 spam
Attempted to steal Steam Login Credentials.
2021-01-25 06:01:47
45.146.165.25 attack
[LAN access from remote] from 45.146.165.25:42864 to 192.168.0.xx:xx, Thursday, November 05, 2020 05:07:07
2021-01-16 02:24:18
2600:387:b:9a2::50 attacknormal
Ip banned from multiple websites fro this IP. Pro tip, im on a mobilr device NOT in washington where it says its at. So... Yeah.
2021-01-19 01:20:17
134.122.30.143 normal
aaa
2021-01-19 04:43:50

Recently Reported IPs

244.173.201.57 19.29.130.252 160.102.19.25 198.40.117.21
159.88.195.101 116.132.84.95 254.158.167.174 217.176.90.193
200.57.188.181 131.5.106.212 199.202.28.208 98.157.235.143
101.31.108.201 249.7.249.94 130.36.79.148 197.137.16.58
142.106.195.228 9.229.46.97 120.204.102.61 38.114.65.60