Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.204.71.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.204.71.107.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101501 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 16 03:56:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 107.71.204.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.71.204.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.117.177.82 attackspambots
SSH login attempts.
2020-10-10 14:04:45
194.5.177.67 attackspambots
Oct  9 23:13:29 onepixel sshd[1831608]: Failed password for root from 194.5.177.67 port 41860 ssh2
Oct  9 23:16:10 onepixel sshd[1832013]: Invalid user admin from 194.5.177.67 port 52786
Oct  9 23:16:10 onepixel sshd[1832013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.177.67 
Oct  9 23:16:10 onepixel sshd[1832013]: Invalid user admin from 194.5.177.67 port 52786
Oct  9 23:16:11 onepixel sshd[1832013]: Failed password for invalid user admin from 194.5.177.67 port 52786 ssh2
2020-10-10 14:21:08
106.0.58.136 attackspambots
Web scan/attack: detected 1 distinct attempts within a 12-hour window (GPON (CVE-2018-10561))
2020-10-10 07:56:52
132.232.31.157 attack
Oct 10 04:37:34 ns382633 sshd\[2040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Oct 10 04:37:35 ns382633 sshd\[2040\]: Failed password for root from 132.232.31.157 port 55952 ssh2
Oct 10 04:44:21 ns382633 sshd\[3246\]: Invalid user perry from 132.232.31.157 port 53418
Oct 10 04:44:21 ns382633 sshd\[3246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157
Oct 10 04:44:23 ns382633 sshd\[3246\]: Failed password for invalid user perry from 132.232.31.157 port 53418 ssh2
2020-10-10 14:12:01
51.91.123.235 attack
51.91.123.235 - - [10/Oct/2020:07:40:25 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-10 14:17:55
203.189.253.172 attack
Oct  9 16:17:25 ny01 sshd[13322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.189.253.172
Oct  9 16:17:27 ny01 sshd[13322]: Failed password for invalid user thinker from 203.189.253.172 port 52060 ssh2
Oct  9 16:21:51 ny01 sshd[13858]: Failed password for root from 203.189.253.172 port 59774 ssh2
2020-10-10 07:57:49
211.145.49.253 attackbots
Oct 10 01:40:56 NPSTNNYC01T sshd[9446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.145.49.253
Oct 10 01:40:58 NPSTNNYC01T sshd[9446]: Failed password for invalid user test from 211.145.49.253 port 31273 ssh2
Oct 10 01:44:59 NPSTNNYC01T sshd[9955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.145.49.253
...
2020-10-10 13:57:52
94.102.50.176 attackspam
Sep 9 17:08:32 *hidden* postfix/postscreen[28795]: DNSBL rank 3 for [94.102.50.176]:52261
2020-10-10 14:20:22
106.55.242.70 attack
Oct 10 02:48:25 db sshd[16000]: User root from 106.55.242.70 not allowed because none of user's groups are listed in AllowGroups
...
2020-10-10 14:12:54
200.169.6.206 attackspambots
Oct 8 02:03:34 *hidden* sshd[19302]: Failed password for *hidden* from 200.169.6.206 port 46503 ssh2 Oct 8 02:07:32 *hidden* sshd[21213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.169.6.206 user=root Oct 8 02:07:35 *hidden* sshd[21213]: Failed password for *hidden* from 200.169.6.206 port 44412 ssh2
2020-10-10 07:59:19
63.240.240.74 attackspam
Oct 10 07:40:52 vpn01 sshd[18782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74
Oct 10 07:40:54 vpn01 sshd[18782]: Failed password for invalid user tester from 63.240.240.74 port 41288 ssh2
...
2020-10-10 13:57:10
94.102.54.246 attack
" "
2020-10-10 14:13:42
68.99.206.195 attack
Unauthorized connection attempt detected from IP address 68.99.206.195 to port 5555
2020-10-10 08:05:13
80.82.65.90 attackbots
 UDP 80.82.65.90:38382 -> port 1900, len 118
2020-10-10 14:05:52
45.119.82.251 attack
2020-10-10T00:30:02.841285yoshi.linuxbox.ninja sshd[708050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.82.251
2020-10-10T00:30:02.835439yoshi.linuxbox.ninja sshd[708050]: Invalid user clamavclamav from 45.119.82.251 port 40988
2020-10-10T00:30:05.187659yoshi.linuxbox.ninja sshd[708050]: Failed password for invalid user clamavclamav from 45.119.82.251 port 40988 ssh2
...
2020-10-10 14:06:26

Recently Reported IPs

193.10.118.201 198.160.233.161 61.206.135.243 157.230.79.5
141.154.215.101 130.33.83.249 151.70.56.182 136.250.9.138
187.129.32.64 149.76.44.199 30.197.166.45 149.232.157.139
160.9.75.126 66.194.240.60 55.160.251.0 216.162.160.170
72.48.95.188 185.116.189.21 11.249.219.20 242.184.254.74