Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.134.27.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.134.27.212.			IN	A

;; AUTHORITY SECTION:
.			9	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:27:23 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 212.27.134.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.27.134.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.17.28.76 attackbotsspam
Unauthorized connection attempt from IP address 184.17.28.76 on Port 445(SMB)
2020-08-02 09:08:33
45.84.196.58 attackbotsspam
2020-08-01T23:55:49.857996uwu-server sshd[1358097]: Invalid user oracle from 45.84.196.58 port 46400
2020-08-01T23:55:51.640994uwu-server sshd[1358097]: Failed password for invalid user oracle from 45.84.196.58 port 46400 ssh2
2020-08-01T23:55:53.236319uwu-server sshd[1358118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.84.196.58  user=root
2020-08-01T23:55:54.888939uwu-server sshd[1358118]: Failed password for root from 45.84.196.58 port 53524 ssh2
2020-08-01T23:55:56.288639uwu-server sshd[1358165]: Invalid user postgres from 45.84.196.58 port 60444
...
2020-08-02 12:05:01
192.95.29.186 attack
20 attempts against mh-misbehave-ban on pluto
2020-08-02 09:04:40
156.96.56.72 attackspam
smtp pestering
2020-08-02 12:23:43
3.6.37.185 attack
Attempted connection to port 3389.
2020-08-02 09:01:56
144.217.95.97 attackbotsspam
Aug  2 06:08:51 lnxmail61 sshd[15800]: Failed password for root from 144.217.95.97 port 41504 ssh2
Aug  2 06:08:51 lnxmail61 sshd[15800]: Failed password for root from 144.217.95.97 port 41504 ssh2
2020-08-02 12:26:54
49.233.92.166 attackspambots
(sshd) Failed SSH login from 49.233.92.166 (CN/China/-): 5 in the last 3600 secs
2020-08-02 12:22:40
111.229.246.61 attackbots
$f2bV_matches
2020-08-02 12:30:41
222.186.31.83 attackspambots
Aug  2 06:17:38 vps sshd[834681]: Failed password for root from 222.186.31.83 port 40687 ssh2
Aug  2 06:17:40 vps sshd[834681]: Failed password for root from 222.186.31.83 port 40687 ssh2
Aug  2 06:17:50 vps sshd[835472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Aug  2 06:17:52 vps sshd[835472]: Failed password for root from 222.186.31.83 port 51929 ssh2
Aug  2 06:17:54 vps sshd[835472]: Failed password for root from 222.186.31.83 port 51929 ssh2
...
2020-08-02 12:19:44
222.186.30.35 attack
Aug  1 18:22:08 sachi sshd\[31753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Aug  1 18:22:10 sachi sshd\[31753\]: Failed password for root from 222.186.30.35 port 41493 ssh2
Aug  1 18:22:12 sachi sshd\[31753\]: Failed password for root from 222.186.30.35 port 41493 ssh2
Aug  1 18:22:14 sachi sshd\[31753\]: Failed password for root from 222.186.30.35 port 41493 ssh2
Aug  1 18:22:16 sachi sshd\[31776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-08-02 12:24:12
222.186.42.57 attackspam
2020-08-02T04:17:10.098899randservbullet-proofcloud-66.localdomain sshd[14665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
2020-08-02T04:17:12.398320randservbullet-proofcloud-66.localdomain sshd[14665]: Failed password for root from 222.186.42.57 port 57212 ssh2
2020-08-02T04:17:14.935781randservbullet-proofcloud-66.localdomain sshd[14665]: Failed password for root from 222.186.42.57 port 57212 ssh2
2020-08-02T04:17:10.098899randservbullet-proofcloud-66.localdomain sshd[14665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
2020-08-02T04:17:12.398320randservbullet-proofcloud-66.localdomain sshd[14665]: Failed password for root from 222.186.42.57 port 57212 ssh2
2020-08-02T04:17:14.935781randservbullet-proofcloud-66.localdomain sshd[14665]: Failed password for root from 222.186.42.57 port 57212 ssh2
...
2020-08-02 12:19:08
119.226.106.130 attackbotsspam
SMB Server BruteForce Attack
2020-08-02 12:18:34
49.233.172.85 attack
Aug  2 05:56:05 lnxweb62 sshd[22331]: Failed password for root from 49.233.172.85 port 53252 ssh2
Aug  2 05:56:05 lnxweb62 sshd[22331]: Failed password for root from 49.233.172.85 port 53252 ssh2
2020-08-02 12:11:27
101.69.200.162 attackbots
Aug  2 00:48:00 plex-server sshd[192720]: Failed password for root from 101.69.200.162 port 52612 ssh2
Aug  2 00:50:25 plex-server sshd[193875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.69.200.162  user=root
Aug  2 00:50:27 plex-server sshd[193875]: Failed password for root from 101.69.200.162 port 50350 ssh2
Aug  2 00:52:47 plex-server sshd[194899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.69.200.162  user=root
Aug  2 00:52:49 plex-server sshd[194899]: Failed password for root from 101.69.200.162 port 25528 ssh2
...
2020-08-02 09:08:08
222.186.180.142 attackspambots
Aug  2 06:13:13 vpn01 sshd[25104]: Failed password for root from 222.186.180.142 port 41486 ssh2
Aug  2 06:13:15 vpn01 sshd[25104]: Failed password for root from 222.186.180.142 port 41486 ssh2
...
2020-08-02 12:14:19

Recently Reported IPs

11.133.52.152 11.135.213.202 11.134.199.221 11.136.248.58
11.135.11.209 11.133.61.219 11.133.240.75 11.134.55.213
11.134.24.239 11.135.173.7 11.139.145.51 11.134.145.93
11.133.241.233 11.134.249.51 11.135.6.62 11.133.46.56
11.138.141.20 11.136.143.55 11.133.156.20 11.133.236.60