Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.134.83.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54595
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.134.83.80.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 06:10:48 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 80.83.134.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.83.134.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.227.109.54 attack
spam (f2b h1)
2020-06-08 20:45:28
189.206.165.62 attackbots
Jun  8 14:20:37 PorscheCustomer sshd[22484]: Failed password for root from 189.206.165.62 port 49044 ssh2
Jun  8 14:24:30 PorscheCustomer sshd[22606]: Failed password for root from 189.206.165.62 port 52412 ssh2
...
2020-06-08 20:44:15
195.24.212.166 attackspam
port scan and connect, tcp 8080 (http-proxy)
2020-06-08 20:52:06
209.126.132.29 attackspambots
20 attempts against mh-ssh on cloud
2020-06-08 21:06:13
183.67.95.182 attackbotsspam
Lines containing failures of 183.67.95.182
Jun  8 11:17:00 kopano sshd[11372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.67.95.182  user=r.r
Jun  8 11:17:03 kopano sshd[11372]: Failed password for r.r from 183.67.95.182 port 24209 ssh2
Jun  8 11:17:03 kopano sshd[11372]: Received disconnect from 183.67.95.182 port 24209:11: Bye Bye [preauth]
Jun  8 11:17:03 kopano sshd[11372]: Disconnected from authenticating user r.r 183.67.95.182 port 24209 [preauth]
Jun  8 11:21:14 kopano sshd[11511]: Connection closed by 183.67.95.182 port 15560 [preauth]
Jun  8 11:24:56 kopano sshd[11672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.67.95.182  user=r.r
Jun  8 11:24:58 kopano sshd[11672]: Failed password for r.r from 183.67.95.182 port 63396 ssh2
Jun  8 11:24:58 kopano sshd[11672]: Received disconnect from 183.67.95.182 port 63396:11: Bye Bye [preauth]
Jun  8 11:24:58 kopano sshd[11672]:........
------------------------------
2020-06-08 20:32:29
222.186.15.158 attack
Jun  8 02:39:25 web9 sshd\[18062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Jun  8 02:39:27 web9 sshd\[18062\]: Failed password for root from 222.186.15.158 port 30907 ssh2
Jun  8 02:39:44 web9 sshd\[18095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Jun  8 02:39:45 web9 sshd\[18095\]: Failed password for root from 222.186.15.158 port 39804 ssh2
Jun  8 02:39:47 web9 sshd\[18095\]: Failed password for root from 222.186.15.158 port 39804 ssh2
2020-06-08 20:40:40
51.116.173.70 attackbotsspam
Jun  8 14:09:40 ns3164893 sshd[32660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.116.173.70  user=root
Jun  8 14:09:42 ns3164893 sshd[32660]: Failed password for root from 51.116.173.70 port 34056 ssh2
...
2020-06-08 20:36:49
102.39.166.38 attackbotsspam
Unauthorised access (Jun  8) SRC=102.39.166.38 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=28341 DF TCP DPT=8080 WINDOW=14600 SYN
2020-06-08 20:24:48
180.76.135.15 attackspambots
$f2bV_matches
2020-06-08 20:38:47
117.55.252.33 attackspambots
Automatic report - XMLRPC Attack
2020-06-08 20:46:16
51.91.157.101 attackbots
Jun  8 09:10:19 firewall sshd[5097]: Failed password for root from 51.91.157.101 port 33376 ssh2
Jun  8 09:13:30 firewall sshd[5201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.101  user=root
Jun  8 09:13:32 firewall sshd[5201]: Failed password for root from 51.91.157.101 port 55858 ssh2
...
2020-06-08 21:07:12
49.233.160.103 attackspambots
Jun  8 11:59:45 vlre-nyc-1 sshd\[26614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.160.103  user=root
Jun  8 11:59:47 vlre-nyc-1 sshd\[26614\]: Failed password for root from 49.233.160.103 port 40420 ssh2
Jun  8 12:04:39 vlre-nyc-1 sshd\[26712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.160.103  user=root
Jun  8 12:04:41 vlre-nyc-1 sshd\[26712\]: Failed password for root from 49.233.160.103 port 34480 ssh2
Jun  8 12:09:31 vlre-nyc-1 sshd\[26817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.160.103  user=root
...
2020-06-08 20:40:58
189.131.209.113 attackbotsspam
Jun  8 12:02:02 ip-172-31-61-156 sshd[4118]: Failed password for root from 189.131.209.113 port 42046 ssh2
Jun  8 12:05:35 ip-172-31-61-156 sshd[4380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.131.209.113  user=root
Jun  8 12:05:38 ip-172-31-61-156 sshd[4380]: Failed password for root from 189.131.209.113 port 38832 ssh2
Jun  8 12:09:06 ip-172-31-61-156 sshd[4669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.131.209.113  user=root
Jun  8 12:09:08 ip-172-31-61-156 sshd[4669]: Failed password for root from 189.131.209.113 port 35634 ssh2
...
2020-06-08 21:07:34
189.240.62.227 attackspam
SSH Brute-Force Attack
2020-06-08 20:32:07
50.195.136.210 attack
Jun  8 13:13:03 pornomens sshd\[5753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.195.136.210  user=root
Jun  8 13:13:05 pornomens sshd\[5753\]: Failed password for root from 50.195.136.210 port 37395 ssh2
Jun  8 14:09:49 pornomens sshd\[6442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.195.136.210  user=root
...
2020-06-08 20:28:30

Recently Reported IPs

0.136.192.138 0.142.32.239 0.136.44.125 0.137.117.2
0.139.32.17 0.135.120.148 0.133.201.242 0.142.66.66
0.134.142.226 0.137.86.24 0.136.120.148 0.137.159.91
0.139.165.211 0.136.51.63 0.135.182.129 0.136.132.42
0.134.235.239 0.144.225.230 0.144.174.122 0.134.0.43