Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.34.95.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.34.95.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 20:31:45 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 147.95.34.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.95.34.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.21.88.115 attackspam
Email rejected due to spam filtering
2020-08-27 23:09:15
45.95.168.131 attackspam
Aug 27 15:45:28 srv0 sshd\[33014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.131  user=root
Aug 27 15:45:29 srv0 sshd\[33014\]: Failed password for root from 45.95.168.131 port 60046 ssh2
Aug 27 15:47:09 srv0 sshd\[33572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.131  user=root
...
2020-08-27 22:47:15
187.10.231.238 attack
Aug 27 14:47:10 web-main sshd[3341657]: Failed password for invalid user black from 187.10.231.238 port 46962 ssh2
Aug 27 15:01:19 web-main sshd[3343467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.10.231.238  user=root
Aug 27 15:01:20 web-main sshd[3343467]: Failed password for root from 187.10.231.238 port 37620 ssh2
2020-08-27 23:15:07
2.218.28.154 attackspambots
Automatic report - Port Scan Attack
2020-08-27 23:06:42
220.137.210.155 attack
Lots of Login attempts to root account
2020-08-27 23:05:20
164.68.110.55 attackspambots
Unauthorized connection attempt from IP address 164.68.110.55 on Port 445(SMB)
2020-08-27 22:56:26
201.48.192.60 attackspam
Aug 27 16:33:11 ns381471 sshd[28046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
Aug 27 16:33:12 ns381471 sshd[28046]: Failed password for invalid user markus from 201.48.192.60 port 33744 ssh2
2020-08-27 23:25:25
98.6.192.196 attackbotsspam
Lots of Login attempts to root account
2020-08-27 23:12:43
106.12.30.236 attack
Aug 27 16:16:22 vpn01 sshd[31006]: Failed password for root from 106.12.30.236 port 38768 ssh2
...
2020-08-27 22:43:49
159.65.86.239 attack
Automatic report BANNED IP
2020-08-27 22:50:36
210.217.32.25 attackspam
Attempted Brute Force (dovecot)
2020-08-27 23:18:51
103.42.99.3 attackspam
Unauthorized connection attempt from IP address 103.42.99.3 on Port 445(SMB)
2020-08-27 23:14:30
188.173.80.134 attackspam
Aug 27 13:17:49 plex-server sshd[428829]: Invalid user service from 188.173.80.134 port 39889
Aug 27 13:17:49 plex-server sshd[428829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.80.134 
Aug 27 13:17:49 plex-server sshd[428829]: Invalid user service from 188.173.80.134 port 39889
Aug 27 13:17:51 plex-server sshd[428829]: Failed password for invalid user service from 188.173.80.134 port 39889 ssh2
Aug 27 13:21:54 plex-server sshd[431160]: Invalid user git from 188.173.80.134 port 44141
...
2020-08-27 22:55:59
102.176.81.99 attackspambots
2020-08-27T09:05:27.598636linuxbox-skyline sshd[191990]: Invalid user server from 102.176.81.99 port 53472
...
2020-08-27 23:21:21
51.195.136.14 attackspam
Aug 27 10:36:55 NPSTNNYC01T sshd[417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.136.14
Aug 27 10:36:56 NPSTNNYC01T sshd[417]: Failed password for invalid user superadmin from 51.195.136.14 port 42322 ssh2
Aug 27 10:41:06 NPSTNNYC01T sshd[751]: Failed password for root from 51.195.136.14 port 50424 ssh2
...
2020-08-27 22:48:44

Recently Reported IPs

89.219.186.158 193.46.180.119 119.139.112.246 240.198.116.19
201.73.21.106 252.55.9.131 85.78.136.232 39.236.59.114
57.33.250.102 54.42.143.49 237.72.22.6 78.45.187.81
55.214.107.132 226.86.39.239 198.206.142.102 170.28.154.11
69.243.144.30 255.13.177.172 239.150.40.151 232.96.125.229