Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uganda

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.134.149.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19847
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.134.149.120.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:10:14 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 120.149.134.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.149.134.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.15.212.48 attack
Oct 23 23:56:58 www4 sshd\[57271\]: Invalid user pgsql from 51.15.212.48
Oct 23 23:56:58 www4 sshd\[57271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.212.48
Oct 23 23:57:01 www4 sshd\[57271\]: Failed password for invalid user pgsql from 51.15.212.48 port 54512 ssh2
...
2019-10-24 06:27:06
94.191.40.166 attackbots
Invalid user schneider from 94.191.40.166 port 48800
2019-10-24 06:31:49
129.213.184.65 attack
Oct 23 21:37:46 venus sshd\[9269\]: Invalid user shuan from 129.213.184.65 port 38897
Oct 23 21:37:46 venus sshd\[9269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.184.65
Oct 23 21:37:48 venus sshd\[9269\]: Failed password for invalid user shuan from 129.213.184.65 port 38897 ssh2
...
2019-10-24 06:27:55
181.25.76.6 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/181.25.76.6/ 
 
 AR - 1H : (34)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN22927 
 
 IP : 181.25.76.6 
 
 CIDR : 181.24.0.0/14 
 
 PREFIX COUNT : 244 
 
 UNIQUE IP COUNT : 4001024 
 
 
 ATTACKS DETECTED ASN22927 :  
  1H - 1 
  3H - 1 
  6H - 3 
 12H - 9 
 24H - 16 
 
 DateTime : 2019-10-23 22:13:43 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-24 06:58:51
157.230.92.254 attack
157.230.92.254 - - \[23/Oct/2019:20:14:28 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
157.230.92.254 - - \[23/Oct/2019:20:14:32 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-10-24 06:34:10
86.49.228.10 attack
Autoban   86.49.228.10 AUTH/CONNECT
2019-10-24 06:38:37
58.87.75.178 attackbots
Oct 24 00:59:01 lnxweb62 sshd[19807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.75.178
Oct 24 00:59:01 lnxweb62 sshd[19807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.75.178
2019-10-24 07:03:47
85.144.226.170 attackbotsspam
Oct 23 22:32:24 venus sshd\[9953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170  user=root
Oct 23 22:32:26 venus sshd\[9953\]: Failed password for root from 85.144.226.170 port 40076 ssh2
Oct 23 22:36:57 venus sshd\[10016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170  user=root
...
2019-10-24 06:52:59
212.47.251.164 attackspambots
Oct 23 10:24:30 kapalua sshd\[12346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164-251-47-212.rev.cloud.scaleway.com  user=root
Oct 23 10:24:32 kapalua sshd\[12346\]: Failed password for root from 212.47.251.164 port 34206 ssh2
Oct 23 10:28:11 kapalua sshd\[12795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164-251-47-212.rev.cloud.scaleway.com  user=root
Oct 23 10:28:13 kapalua sshd\[12795\]: Failed password for root from 212.47.251.164 port 46610 ssh2
Oct 23 10:31:45 kapalua sshd\[13073\]: Invalid user admin from 212.47.251.164
2019-10-24 06:55:17
39.105.160.239 attackbots
39.105.160.239 - - [23/Oct/2019:22:14:04 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
39.105.160.239 - - [23/Oct/2019:22:14:06 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
39.105.160.239 - - [23/Oct/2019:22:14:07 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
39.105.160.239 - - [23/Oct/2019:22:14:08 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
39.105.160.239 - - [23/Oct/2019:22:14:09 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
39.105.160.239 - - [23/Oct/2019:22:14:10 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-24 06:46:15
86.188.246.2 attackspambots
Oct 23 10:56:12 hanapaa sshd\[31505\]: Invalid user matt from 86.188.246.2
Oct 23 10:56:12 hanapaa sshd\[31505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2
Oct 23 10:56:14 hanapaa sshd\[31505\]: Failed password for invalid user matt from 86.188.246.2 port 44964 ssh2
Oct 23 11:00:03 hanapaa sshd\[31781\]: Invalid user rf from 86.188.246.2
Oct 23 11:00:04 hanapaa sshd\[31781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2
2019-10-24 06:31:37
190.13.129.34 attackbots
Aug 13 13:55:05 vtv3 sshd\[30200\]: Invalid user vishal from 190.13.129.34 port 34390
Aug 13 13:55:05 vtv3 sshd\[30200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34
Aug 13 13:55:07 vtv3 sshd\[30200\]: Failed password for invalid user vishal from 190.13.129.34 port 34390 ssh2
Aug 13 14:01:00 vtv3 sshd\[911\]: Invalid user vinnie from 190.13.129.34 port 55594
Aug 13 14:01:00 vtv3 sshd\[911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34
Aug 13 14:14:11 vtv3 sshd\[7079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34  user=root
Aug 13 14:14:12 vtv3 sshd\[7079\]: Failed password for root from 190.13.129.34 port 41522 ssh2
Aug 13 14:20:35 vtv3 sshd\[10399\]: Invalid user semenov from 190.13.129.34 port 34490
Aug 13 14:20:35 vtv3 sshd\[10399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190
2019-10-24 06:44:11
144.217.214.13 attack
F2B jail: sshd. Time: 2019-10-23 23:52:51, Reported by: VKReport
2019-10-24 06:47:40
117.66.243.77 attackspambots
2019-10-23T21:15:49.117171abusebot-8.cloudsearch.cf sshd\[28193\]: Invalid user technical from 117.66.243.77 port 33968
2019-10-24 06:49:32
222.186.173.215 attackspam
Oct 23 19:47:26 firewall sshd[5531]: Failed password for root from 222.186.173.215 port 55248 ssh2
Oct 23 19:47:26 firewall sshd[5531]: error: maximum authentication attempts exceeded for root from 222.186.173.215 port 55248 ssh2 [preauth]
Oct 23 19:47:26 firewall sshd[5531]: Disconnecting: Too many authentication failures [preauth]
...
2019-10-24 06:55:47

Recently Reported IPs

115.72.10.111 185.192.100.103 116.30.149.71 220.174.42.140
45.83.66.77 201.91.82.155 13.92.154.8 45.162.228.206
123.8.173.111 177.105.68.82 68.116.20.138 31.134.32.29
142.93.158.193 60.176.27.42 45.83.67.100 41.230.76.8
108.5.142.193 178.91.234.74 125.78.6.93 179.49.134.198