Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.245.22.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.245.22.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 20:09:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
134.22.245.107.in-addr.arpa domain name pointer mobile-107-245-22-134.mycingular.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.22.245.107.in-addr.arpa	name = mobile-107-245-22-134.mycingular.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.99.37.134 attackspambots
SSH bruteforce
2019-10-05 23:02:28
106.12.215.130 attackbots
Oct  5 01:49:57 wbs sshd\[17252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.130  user=root
Oct  5 01:49:59 wbs sshd\[17252\]: Failed password for root from 106.12.215.130 port 33110 ssh2
Oct  5 01:54:42 wbs sshd\[17676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.130  user=root
Oct  5 01:54:44 wbs sshd\[17676\]: Failed password for root from 106.12.215.130 port 39356 ssh2
Oct  5 01:59:31 wbs sshd\[18075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.130  user=root
2019-10-05 23:28:42
85.30.215.48 attack
Chat Spam
2019-10-05 22:48:51
27.155.99.161 attack
Oct  5 16:56:46 ArkNodeAT sshd\[26629\]: Invalid user altri from 27.155.99.161
Oct  5 16:56:46 ArkNodeAT sshd\[26629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.155.99.161
Oct  5 16:56:49 ArkNodeAT sshd\[26629\]: Failed password for invalid user altri from 27.155.99.161 port 60408 ssh2
2019-10-05 23:18:14
140.143.16.158 attackspam
www noscript
...
2019-10-05 23:15:26
222.252.90.151 attackspam
Chat Spam
2019-10-05 22:48:35
177.155.134.38 attack
postfix
2019-10-05 23:10:36
61.19.22.217 attackspambots
Oct  5 16:39:24 legacy sshd[11787]: Failed password for root from 61.19.22.217 port 52556 ssh2
Oct  5 16:44:05 legacy sshd[11913]: Failed password for root from 61.19.22.217 port 36252 ssh2
...
2019-10-05 22:53:47
190.15.134.12 attack
Oct  5 16:59:42 vps01 sshd[3673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.15.134.12
Oct  5 16:59:45 vps01 sshd[3673]: Failed password for invalid user 2wsx#EDC4rfv%TGB from 190.15.134.12 port 35032 ssh2
2019-10-05 23:05:18
198.245.63.94 attackspambots
Oct  5 14:45:03 venus sshd\[3758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.63.94  user=root
Oct  5 14:45:05 venus sshd\[3758\]: Failed password for root from 198.245.63.94 port 59132 ssh2
Oct  5 14:48:32 venus sshd\[3809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.63.94  user=root
...
2019-10-05 22:56:19
39.74.89.40 attack
Unauthorised access (Oct  5) SRC=39.74.89.40 LEN=40 TTL=49 ID=14792 TCP DPT=8080 WINDOW=51821 SYN 
Unauthorised access (Oct  5) SRC=39.74.89.40 LEN=40 TTL=49 ID=48364 TCP DPT=8080 WINDOW=31968 SYN 
Unauthorised access (Oct  3) SRC=39.74.89.40 LEN=40 TTL=49 ID=51386 TCP DPT=8080 WINDOW=51821 SYN 
Unauthorised access (Oct  3) SRC=39.74.89.40 LEN=40 TTL=49 ID=41578 TCP DPT=8080 WINDOW=20176 SYN
2019-10-05 22:55:19
118.24.7.101 attackspambots
Oct  5 09:58:04 xtremcommunity sshd\[206358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.7.101  user=root
Oct  5 09:58:06 xtremcommunity sshd\[206358\]: Failed password for root from 118.24.7.101 port 50664 ssh2
Oct  5 10:02:53 xtremcommunity sshd\[206451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.7.101  user=root
Oct  5 10:02:55 xtremcommunity sshd\[206451\]: Failed password for root from 118.24.7.101 port 54758 ssh2
Oct  5 10:07:55 xtremcommunity sshd\[206530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.7.101  user=root
...
2019-10-05 23:02:12
217.35.75.193 attackbots
2019-10-05T12:50:15.284534abusebot-2.cloudsearch.cf sshd\[16469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host217-35-75-193.in-addr.btopenworld.com  user=root
2019-10-05 23:23:51
186.103.197.99 attackbots
SMB Server BruteForce Attack
2019-10-05 23:30:13
137.226.113.28 attackbotsspam
137.226.113.28 - - [05/Oct/2019:14:49:05 +0000] "GET / HTTP/1.1" 403 153 "-" "Mozilla/5.0 zgrab/0.x (compatible; Researchscan/t12sns; +http://researchscan.comsys.rwth-aachen.de)"
2019-10-05 22:51:26

Recently Reported IPs

223.17.249.53 38.167.180.16 199.196.123.61 194.10.226.147
67.76.111.72 175.136.183.209 29.7.11.198 31.69.63.156
118.208.19.194 90.117.154.154 84.229.35.245 68.42.180.83
244.98.86.92 65.123.207.196 40.206.196.251 199.146.81.103
207.233.122.53 91.60.225.205 209.102.4.170 156.166.115.120