Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.134.55.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.134.55.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:11:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 64.55.134.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.55.134.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.242.233 attackbotsspam
frenzy
2020-05-27 15:08:33
218.92.0.165 attack
May 27 08:31:07 santamaria sshd\[18472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
May 27 08:31:09 santamaria sshd\[18472\]: Failed password for root from 218.92.0.165 port 58445 ssh2
May 27 08:31:28 santamaria sshd\[18479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
...
2020-05-27 14:35:49
140.143.146.148 attackspambots
May 27 05:54:54 serwer sshd\[5496\]: Invalid user elsi from 140.143.146.148 port 57174
May 27 05:54:54 serwer sshd\[5496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.146.148
May 27 05:54:55 serwer sshd\[5496\]: Failed password for invalid user elsi from 140.143.146.148 port 57174 ssh2
...
2020-05-27 14:31:31
118.169.244.232 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-27 14:59:29
111.92.189.45 attackbots
www.xn--netzfundstckderwoche-yec.de 111.92.189.45 [27/May/2020:05:54:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4213 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
WWW.XN--NETZFUNDSTCKDERWOCHE-YEC.DE 111.92.189.45 [27/May/2020:05:54:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4213 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
2020-05-27 14:45:28
71.6.146.185 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 5801 proto: TCP cat: Misc Attack
2020-05-27 14:28:51
218.92.0.172 attackbots
May 27 07:20:20 combo sshd[11433]: Failed password for root from 218.92.0.172 port 26025 ssh2
May 27 07:20:23 combo sshd[11433]: Failed password for root from 218.92.0.172 port 26025 ssh2
May 27 07:20:27 combo sshd[11433]: Failed password for root from 218.92.0.172 port 26025 ssh2
...
2020-05-27 14:29:52
186.146.1.122 attack
Invalid user admin from 186.146.1.122 port 59262
2020-05-27 14:41:42
212.64.60.50 attackspambots
$f2bV_matches
2020-05-27 14:52:01
106.12.183.209 attackbots
May 27 05:50:24 web01 sshd[10945]: Failed password for root from 106.12.183.209 port 48628 ssh2
...
2020-05-27 14:39:31
180.76.141.221 attack
Failed password for invalid user zanni from 180.76.141.221 port 57451 ssh2
2020-05-27 14:58:18
121.11.103.192 attackspam
May 27 08:11:44 icinga sshd[20896]: Failed password for root from 121.11.103.192 port 38161 ssh2
May 27 08:21:18 icinga sshd[36372]: Failed password for root from 121.11.103.192 port 50527 ssh2
...
2020-05-27 15:05:19
159.203.74.227 attackspam
Invalid user kill from 159.203.74.227 port 46834
2020-05-27 14:58:34
185.215.72.20 attackbots
spam
2020-05-27 14:42:13
106.12.215.238 attack
2020-05-27 00:04:28.032743-0500  localhost sshd[43336]: Failed password for root from 106.12.215.238 port 45022 ssh2
2020-05-27 14:56:33

Recently Reported IPs

58.235.164.89 19.104.243.54 63.187.28.11 173.72.115.56
73.239.151.33 46.7.94.29 243.112.176.48 236.34.255.191
226.6.238.172 202.41.56.199 182.191.105.42 79.63.188.146
149.200.138.105 195.105.153.49 198.234.161.34 32.240.29.183
165.81.14.100 222.181.39.170 178.255.139.188 230.124.20.60