Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.54.149.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;64.54.149.34.			IN	A

;; AUTHORITY SECTION:
.			368	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031301 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 14 06:25:51 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 34.149.54.64.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.149.54.64.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.94.54.84 attackspam
2020-06-09T14:31:47.242139shield sshd\[23248\]: Invalid user user4 from 218.94.54.84 port 11034
2020-06-09T14:31:47.245519shield sshd\[23248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.54.84
2020-06-09T14:31:49.494868shield sshd\[23248\]: Failed password for invalid user user4 from 218.94.54.84 port 11034 ssh2
2020-06-09T14:34:57.387417shield sshd\[24295\]: Invalid user marcelo from 218.94.54.84 port 8749
2020-06-09T14:34:57.391245shield sshd\[24295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.54.84
2020-06-09 23:01:02
103.117.9.151 attackbotsspam
[09/Jun/2020 x@x
[09/Jun/2020 x@x
[09/Jun/2020 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.117.9.151
2020-06-09 23:18:46
111.229.110.107 attackspambots
(sshd) Failed SSH login from 111.229.110.107 (CN/China/-): 5 in the last 3600 secs
2020-06-09 22:49:31
83.240.175.146 attackspam
Jun  9 14:06:30 mail postfix/smtpd[66076]: lost connection after STARTTLS from smtp2.telecom.pt[83.240.175.146]
2020-06-09 23:00:37
151.69.170.146 attack
Jun  9 14:26:29 marvibiene sshd[29380]: Invalid user carrie from 151.69.170.146 port 46766
Jun  9 14:26:29 marvibiene sshd[29380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.69.170.146
Jun  9 14:26:29 marvibiene sshd[29380]: Invalid user carrie from 151.69.170.146 port 46766
Jun  9 14:26:32 marvibiene sshd[29380]: Failed password for invalid user carrie from 151.69.170.146 port 46766 ssh2
...
2020-06-09 23:30:35
39.113.22.246 attackspambots
2020-06-09T14:00:32.340086dmca.cloudsearch.cf sshd[25856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.113.22.246  user=root
2020-06-09T14:00:34.183433dmca.cloudsearch.cf sshd[25856]: Failed password for root from 39.113.22.246 port 37920 ssh2
2020-06-09T14:06:50.440571dmca.cloudsearch.cf sshd[26215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.113.22.246  user=root
2020-06-09T14:06:51.842533dmca.cloudsearch.cf sshd[26215]: Failed password for root from 39.113.22.246 port 55828 ssh2
2020-06-09T14:09:46.599904dmca.cloudsearch.cf sshd[26379]: Invalid user tingting from 39.113.22.246 port 39642
2020-06-09T14:09:46.606143dmca.cloudsearch.cf sshd[26379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.113.22.246
2020-06-09T14:09:46.599904dmca.cloudsearch.cf sshd[26379]: Invalid user tingting from 39.113.22.246 port 39642
2020-06-09T14:09:49.171862dmca.clou
...
2020-06-09 22:50:02
218.89.241.68 attack
15252/tcp 2024/tcp 5825/tcp...
[2020-04-20/06-09]41pkt,20pt.(tcp)
2020-06-09 22:58:29
80.82.77.240 attackspam
 TCP (SYN) 80.82.77.240:64344 -> port 8448, len 44
2020-06-09 23:04:37
41.139.130.159 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-06-09 22:44:17
61.133.232.248 attack
2020-06-09T15:22:38.764538amanda2.illicoweb.com sshd\[43839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.248  user=root
2020-06-09T15:22:40.091537amanda2.illicoweb.com sshd\[43839\]: Failed password for root from 61.133.232.248 port 48982 ssh2
2020-06-09T15:32:19.124654amanda2.illicoweb.com sshd\[44392\]: Invalid user minecraft3 from 61.133.232.248 port 8418
2020-06-09T15:32:19.126813amanda2.illicoweb.com sshd\[44392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.248
2020-06-09T15:32:21.552126amanda2.illicoweb.com sshd\[44392\]: Failed password for invalid user minecraft3 from 61.133.232.248 port 8418 ssh2
...
2020-06-09 23:01:35
96.125.164.246 attack
Jun  9 16:44:27 rotator sshd\[28270\]: Invalid user redhat from 96.125.164.246Jun  9 16:44:28 rotator sshd\[28270\]: Failed password for invalid user redhat from 96.125.164.246 port 59800 ssh2Jun  9 16:46:10 rotator sshd\[29046\]: Failed password for root from 96.125.164.246 port 52934 ssh2Jun  9 16:47:16 rotator sshd\[29078\]: Failed password for root from 96.125.164.246 port 45022 ssh2Jun  9 16:48:46 rotator sshd\[29100\]: Failed password for root from 96.125.164.246 port 40206 ssh2Jun  9 16:50:14 rotator sshd\[29427\]: Failed password for root from 96.125.164.246 port 58426 ssh2
...
2020-06-09 22:53:59
43.251.102.93 attackbots
prod8
...
2020-06-09 22:53:03
218.92.0.168 attackbotsspam
Jun  9 16:55:34 abendstille sshd\[27270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
Jun  9 16:55:34 abendstille sshd\[27317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
Jun  9 16:55:36 abendstille sshd\[27270\]: Failed password for root from 218.92.0.168 port 17214 ssh2
Jun  9 16:55:37 abendstille sshd\[27317\]: Failed password for root from 218.92.0.168 port 5752 ssh2
Jun  9 16:55:39 abendstille sshd\[27270\]: Failed password for root from 218.92.0.168 port 17214 ssh2
...
2020-06-09 22:57:57
110.188.20.58 attackbots
Jun  9 14:34:12 localhost sshd[60010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.188.20.58  user=root
Jun  9 14:34:14 localhost sshd[60010]: Failed password for root from 110.188.20.58 port 58254 ssh2
Jun  9 14:38:34 localhost sshd[60367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.188.20.58  user=root
Jun  9 14:38:36 localhost sshd[60367]: Failed password for root from 110.188.20.58 port 53542 ssh2
Jun  9 14:43:02 localhost sshd[60756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.188.20.58  user=root
Jun  9 14:43:03 localhost sshd[60756]: Failed password for root from 110.188.20.58 port 48828 ssh2
...
2020-06-09 23:14:05
106.75.156.107 attackbots
2020-06-09T06:53:23.788800morrigan.ad5gb.com sshd[19088]: Failed password for root from 106.75.156.107 port 50894 ssh2
2020-06-09T06:53:25.019088morrigan.ad5gb.com sshd[19088]: Disconnected from authenticating user root 106.75.156.107 port 50894 [preauth]
2020-06-09T07:06:43.948174morrigan.ad5gb.com sshd[19281]: Invalid user rf from 106.75.156.107 port 53936
2020-06-09 22:45:57

Recently Reported IPs

209.220.244.57 158.206.231.20 92.212.175.45 93.59.63.44
1.111.35.17 101.173.56.226 45.143.97.244 61.37.220.246
84.244.67.101 213.45.185.185 248.144.58.29 155.237.202.129
87.135.70.78 100.231.182.102 190.200.187.67 67.67.171.20
83.242.106.163 165.16.37.150 188.108.207.152 125.9.96.198