Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.134.199.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.134.199.221.			IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:27:24 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 221.199.134.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.199.134.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.226.52.220 attackbotsspam
Automatic report - Port Scan
2020-03-31 00:43:28
223.247.223.194 attackbots
Brute force SMTP login attempted.
...
2020-03-31 00:47:45
177.103.202.52 attackbotsspam
Automatic report - Port Scan Attack
2020-03-31 00:24:07
223.247.223.39 attack
Brute force SMTP login attempted.
...
2020-03-31 00:46:14
58.186.112.225 attackbots
DATE:2020-03-30 15:55:52, IP:58.186.112.225, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2020-03-31 00:39:08
180.76.171.53 attackspambots
SSH brute force attempt
2020-03-31 00:50:15
142.93.218.236 attack
Mar 30 15:55:41 ourumov-web sshd\[27198\]: Invalid user www from 142.93.218.236 port 46096
Mar 30 15:55:41 ourumov-web sshd\[27198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.218.236
Mar 30 15:55:43 ourumov-web sshd\[27198\]: Failed password for invalid user www from 142.93.218.236 port 46096 ssh2
...
2020-03-31 00:52:27
114.252.230.245 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-31 00:27:19
223.66.215.80 attackbots
Brute force SMTP login attempted.
...
2020-03-31 00:25:13
192.241.166.199 attackbots
Mar 30 15:55:54 debian-2gb-nbg1-2 kernel: \[7835611.709828\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=192.241.166.199 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=54 ID=0 DF PROTO=TCP SPT=22 DPT=7932 WINDOW=29200 RES=0x00 ACK SYN URGP=0
2020-03-31 00:36:20
223.68.10.16 attackbots
Brute force SMTP login attempted.
...
2020-03-31 00:23:25
3.92.224.101 attackspambots
port
2020-03-31 00:21:03
50.235.70.202 attack
Brute force SMTP login attempted.
...
2020-03-31 00:53:30
223.29.207.214 attackbotsspam
Automatic report BANNED IP
2020-03-31 00:33:24
36.26.64.143 attack
SSH Brute-Forcing (server2)
2020-03-31 00:07:38

Recently Reported IPs

11.135.213.202 11.136.248.58 11.135.11.209 11.133.61.219
11.133.240.75 11.134.55.213 11.134.24.239 11.135.173.7
11.139.145.51 11.134.145.93 11.133.241.233 11.134.249.51
11.135.6.62 11.133.46.56 11.138.141.20 11.136.143.55
11.133.156.20 11.133.236.60 11.134.18.49 11.134.202.142