Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.192.57.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;8.192.57.34.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040801 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 04:44:08 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 34.57.192.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.57.192.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.43.130.47 attackbotsspam
Sep 14 14:02:03 hpm sshd\[24097\]: Invalid user gn from 124.43.130.47
Sep 14 14:02:03 hpm sshd\[24097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.43.130.47
Sep 14 14:02:05 hpm sshd\[24097\]: Failed password for invalid user gn from 124.43.130.47 port 30508 ssh2
Sep 14 14:06:09 hpm sshd\[24464\]: Invalid user nick from 124.43.130.47
Sep 14 14:06:09 hpm sshd\[24464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.43.130.47
2019-09-15 09:28:33
92.222.72.234 attackbots
Sep 15 00:06:12 web8 sshd\[4099\]: Invalid user admin123 from 92.222.72.234
Sep 15 00:06:12 web8 sshd\[4099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234
Sep 15 00:06:14 web8 sshd\[4099\]: Failed password for invalid user admin123 from 92.222.72.234 port 37818 ssh2
Sep 15 00:11:11 web8 sshd\[6527\]: Invalid user customs from 92.222.72.234
Sep 15 00:11:11 web8 sshd\[6527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234
2019-09-15 09:53:44
45.181.196.105 attack
BR - 1H : (107)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN0 
 
 IP : 45.181.196.105 
 
 CIDR : 45.181.196.0/22 
 
 PREFIX COUNT : 50243 
 
 UNIQUE IP COUNT : 856105392 
 
 
 WYKRYTE ATAKI Z ASN0 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-15 10:08:17
106.12.89.190 attack
$f2bV_matches
2019-09-15 09:39:19
218.87.254.235 attack
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:11:52 +0200] "POST /[munged]: HTTP/1.1" 200 10029 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:11:57 +0200] "POST /[munged]: HTTP/1.1" 200 6180 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:12:00 +0200] "POST /[munged]: HTTP/1.1" 200 6180 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:12:04 +0200] "POST /[munged]: HTTP/1.1" 200 6180 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:12:07 +0200] "POST /[munged]: HTTP/1.1" 200 6180 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20
2019-09-15 09:54:30
60.174.92.50 attackspam
[munged]::80 60.174.92.50 - - [14/Sep/2019:20:10:43 +0200] "POST /[munged]: HTTP/1.1" 200 4214 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 60.174.92.50 - - [14/Sep/2019:20:10:45 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 60.174.92.50 - - [14/Sep/2019:20:10:48 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 60.174.92.50 - - [14/Sep/2019:20:10:51 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 60.174.92.50 - - [14/Sep/2019:20:11:56 +0200] "POST /[munged]: HTTP/1.1" 200 4214 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 60.174.92.50 - - [14/Sep/2019:20:11:58 +0200] "POST
2019-09-15 10:09:22
178.62.103.95 attackbots
Sep 14 21:50:58 web8 sshd\[870\]: Invalid user server from 178.62.103.95
Sep 14 21:50:58 web8 sshd\[870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.103.95
Sep 14 21:51:01 web8 sshd\[870\]: Failed password for invalid user server from 178.62.103.95 port 36563 ssh2
Sep 14 21:56:21 web8 sshd\[4077\]: Invalid user nigga from 178.62.103.95
Sep 14 21:56:21 web8 sshd\[4077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.103.95
2019-09-15 10:10:17
37.114.165.205 attack
Chat Spam
2019-09-15 10:12:13
219.142.154.196 attack
SSH Bruteforce
2019-09-15 09:46:34
218.68.204.18 attackbots
RDP Bruteforce
2019-09-15 10:16:14
122.161.192.206 attackspam
Sep 14 15:32:13 php1 sshd\[14201\]: Invalid user user from 122.161.192.206
Sep 14 15:32:13 php1 sshd\[14201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.161.192.206
Sep 14 15:32:15 php1 sshd\[14201\]: Failed password for invalid user user from 122.161.192.206 port 45892 ssh2
Sep 14 15:36:37 php1 sshd\[14738\]: Invalid user bentley from 122.161.192.206
Sep 14 15:36:37 php1 sshd\[14738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.161.192.206
2019-09-15 09:40:34
187.21.17.53 attackbotsspam
Sep 14 19:45:30 mxgate1 postfix/postscreen[12199]: CONNECT from [187.21.17.53]:5635 to [176.31.12.44]:25
Sep 14 19:45:30 mxgate1 postfix/dnsblog[12338]: addr 187.21.17.53 listed by domain cbl.abuseat.org as 127.0.0.2
Sep 14 19:45:30 mxgate1 postfix/dnsblog[12339]: addr 187.21.17.53 listed by domain zen.spamhaus.org as 127.0.0.11
Sep 14 19:45:30 mxgate1 postfix/dnsblog[12339]: addr 187.21.17.53 listed by domain zen.spamhaus.org as 127.0.0.4
Sep 14 19:45:30 mxgate1 postfix/dnsblog[12341]: addr 187.21.17.53 listed by domain b.barracudacentral.org as 127.0.0.2
Sep 14 19:45:36 mxgate1 postfix/postscreen[12199]: DNSBL rank 4 for [187.21.17.53]:5635
Sep x@x
Sep 14 19:45:37 mxgate1 postfix/postscreen[12199]: HANGUP after 1.1 from [187.21.17.53]:5635 in tests after SMTP handshake
Sep 14 19:45:37 mxgate1 postfix/postscreen[12199]: DISCONNECT [187.21.17.53]:5635


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.21.17.53
2019-09-15 10:01:36
163.179.158.199 attackspambots
Sep 14 19:49:05 durga sshd[555653]: Invalid user admin from 163.179.158.199
Sep 14 19:49:05 durga sshd[555653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.179.158.199 
Sep 14 19:49:07 durga sshd[555653]: Failed password for invalid user admin from 163.179.158.199 port 41312 ssh2
Sep 14 19:49:09 durga sshd[555653]: Failed password for invalid user admin from 163.179.158.199 port 41312 ssh2
Sep 14 19:49:12 durga sshd[555653]: Failed password for invalid user admin from 163.179.158.199 port 41312 ssh2
Sep 14 19:49:16 durga sshd[555653]: Failed password for invalid user admin from 163.179.158.199 port 41312 ssh2
Sep 14 19:49:19 durga sshd[555653]: Failed password for invalid user admin from 163.179.158.199 port 41312 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=163.179.158.199
2019-09-15 10:18:14
193.70.81.201 attackbotsspam
detected by Fail2Ban
2019-09-15 10:05:07
165.227.69.188 attackspam
Invalid user telnet from 165.227.69.188 port 51786
2019-09-15 09:57:05

Recently Reported IPs

180.30.191.249 134.32.181.214 51.96.42.155 188.127.164.166
119.123.77.139 148.216.39.130 95.33.61.40 77.222.114.89
123.182.227.222 2604:a880:400:d0::14a7:d001 113.116.88.61 14.177.239.134
46.1.173.184 2604:a880:2:d0::218a:6001 217.11.66.34 42.115.142.124
52.233.136.230 186.92.154.209 72.224.252.150 89.235.115.141