Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.160.54.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.160.54.107.			IN	A

;; AUTHORITY SECTION:
.			592	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052301 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 06:47:13 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 107.54.160.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.54.160.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.29.29.134 attackspambots
Unauthorized connection attempt detected from IP address 78.29.29.134 to port 23 [T]
2020-05-28 17:47:05
118.201.65.165 attack
(sshd) Failed SSH login from 118.201.65.165 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 28 06:22:59 s1 sshd[21995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.201.65.165  user=root
May 28 06:23:02 s1 sshd[21995]: Failed password for root from 118.201.65.165 port 53431 ssh2
May 28 07:03:20 s1 sshd[22776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.201.65.165  user=root
May 28 07:03:22 s1 sshd[22776]: Failed password for root from 118.201.65.165 port 53227 ssh2
May 28 07:11:41 s1 sshd[22911]: Invalid user gudbrand from 118.201.65.165 port 45735
2020-05-28 17:49:58
61.72.255.26 attack
21 attempts against mh-ssh on cloud
2020-05-28 17:31:30
203.186.10.162 attack
SSH invalid-user multiple login try
2020-05-28 17:26:42
222.185.241.130 attackspam
May 28 05:50:07 vps647732 sshd[16627]: Failed password for root from 222.185.241.130 port 45124 ssh2
...
2020-05-28 17:52:11
220.76.205.35 attackspambots
May 28 11:01:22 piServer sshd[6856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.35 
May 28 11:01:24 piServer sshd[6856]: Failed password for invalid user virus from 220.76.205.35 port 48221 ssh2
May 28 11:04:13 piServer sshd[7169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.35 
...
2020-05-28 17:25:52
164.138.23.149 attackbotsspam
May 28 07:17:10 vmd17057 sshd[28648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.23.149 
May 28 07:17:13 vmd17057 sshd[28648]: Failed password for invalid user svn from 164.138.23.149 port 43569 ssh2
...
2020-05-28 17:29:20
106.12.12.242 attack
Invalid user stef from 106.12.12.242 port 34176
2020-05-28 17:59:31
178.128.232.77 attackbotsspam
SSH login attempts.
2020-05-28 17:26:15
49.232.27.254 attackspam
2020-05-28T05:48:24.487327v22018076590370373 sshd[27059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.27.254
2020-05-28T05:48:24.480485v22018076590370373 sshd[27059]: Invalid user Administrator from 49.232.27.254 port 48240
2020-05-28T05:48:26.301917v22018076590370373 sshd[27059]: Failed password for invalid user Administrator from 49.232.27.254 port 48240 ssh2
2020-05-28T05:53:18.307993v22018076590370373 sshd[9341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.27.254  user=root
2020-05-28T05:53:20.147856v22018076590370373 sshd[9341]: Failed password for root from 49.232.27.254 port 44158 ssh2
...
2020-05-28 17:51:23
106.54.11.34 attackspambots
May 28 11:06:25 vpn01 sshd[12999]: Failed password for root from 106.54.11.34 port 38486 ssh2
...
2020-05-28 17:24:06
159.65.137.23 attackbots
May 28 11:09:20 inter-technics sshd[31025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.137.23  user=root
May 28 11:09:22 inter-technics sshd[31025]: Failed password for root from 159.65.137.23 port 53098 ssh2
May 28 11:13:16 inter-technics sshd[31289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.137.23  user=root
May 28 11:13:17 inter-technics sshd[31289]: Failed password for root from 159.65.137.23 port 56666 ssh2
May 28 11:17:09 inter-technics sshd[31553]: Invalid user zhaowei from 159.65.137.23 port 60270
...
2020-05-28 17:33:07
195.68.173.29 attackspam
May 28 06:45:11 prox sshd[4930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.68.173.29 
May 28 06:45:13 prox sshd[4930]: Failed password for invalid user filip from 195.68.173.29 port 42750 ssh2
2020-05-28 17:34:13
58.53.187.164 attack
keeps trying to access my pc. probably 2 or 3 times a day.
2020-05-28 17:45:53
175.116.181.87 attack
May 28 07:52:38 *** sshd[9733]: Invalid user pi from 175.116.181.87
2020-05-28 17:55:33

Recently Reported IPs

15.15.182.26 198.33.12.140 180.220.132.85 252.108.34.133
220.108.104.194 203.176.84.147 21.98.154.137 30.17.62.179
34.32.196.23 5.156.120.23 128.23.140.132 137.205.135.117
89.38.189.27 185.62.88.72 66.224.189.70 89.198.77.159
39.3.205.233 133.200.205.85 81.79.75.227 152.84.205.252