Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.136.134.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65428
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.136.134.48.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020200 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 21:49:38 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 48.134.136.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.134.136.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.199.142.163 attackspam
Unauthorized connection attempt from IP address 200.199.142.163 on Port 445(SMB)
2019-12-13 08:52:50
222.186.175.183 attackbots
Dec 12 14:29:53 php1 sshd\[6534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Dec 12 14:29:55 php1 sshd\[6534\]: Failed password for root from 222.186.175.183 port 35812 ssh2
Dec 12 14:29:59 php1 sshd\[6534\]: Failed password for root from 222.186.175.183 port 35812 ssh2
Dec 12 14:30:02 php1 sshd\[6534\]: Failed password for root from 222.186.175.183 port 35812 ssh2
Dec 12 14:30:11 php1 sshd\[6696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
2019-12-13 08:32:56
186.210.209.49 attack
Automatic report - Port Scan Attack
2019-12-13 08:34:58
45.143.220.70 attackspam
\[2019-12-12 19:38:57\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-12T19:38:57.337-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441603976972",SessionID="0x7f0fb4a47618",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.70/56619",ACLName="no_extension_match"
\[2019-12-12 19:39:33\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-12T19:39:33.471-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="441603976972",SessionID="0x7f0fb4a47618",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.70/59508",ACLName="no_extension_match"
\[2019-12-12 19:40:07\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-12T19:40:07.944-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441603976972",SessionID="0x7f0fb4a47618",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.70/60166",ACLName="no_extens
2019-12-13 08:43:12
80.93.214.15 attackbotsspam
2019-12-12T23:56:03.930289shield sshd\[8418\]: Invalid user web from 80.93.214.15 port 52722
2019-12-12T23:56:03.936106shield sshd\[8418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.93.214.15
2019-12-12T23:56:05.287351shield sshd\[8418\]: Failed password for invalid user web from 80.93.214.15 port 52722 ssh2
2019-12-13T00:01:49.672580shield sshd\[10794\]: Invalid user test from 80.93.214.15 port 33246
2019-12-13T00:01:49.678109shield sshd\[10794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.93.214.15
2019-12-13 08:15:10
148.70.96.124 attack
DATE:2019-12-12 23:56:38,IP:148.70.96.124,MATCHES:10,PORT:ssh
2019-12-13 08:44:38
103.253.107.43 attack
Dec 12 19:50:11 plusreed sshd[15134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.107.43  user=root
Dec 12 19:50:12 plusreed sshd[15134]: Failed password for root from 103.253.107.43 port 58308 ssh2
...
2019-12-13 08:52:12
106.13.83.251 attackspam
Dec 12 13:53:50 web1 sshd\[19921\]: Invalid user gullestad from 106.13.83.251
Dec 12 13:53:50 web1 sshd\[19921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251
Dec 12 13:53:52 web1 sshd\[19921\]: Failed password for invalid user gullestad from 106.13.83.251 port 55946 ssh2
Dec 12 14:00:14 web1 sshd\[20658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251  user=backup
Dec 12 14:00:17 web1 sshd\[20658\]: Failed password for backup from 106.13.83.251 port 57330 ssh2
2019-12-13 08:14:54
185.176.27.254 attack
12/12/2019-19:18:59.350249 185.176.27.254 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-13 08:22:18
62.4.21.233 attack
SSH Brute-Force reported by Fail2Ban
2019-12-13 08:41:51
47.91.90.132 attackbots
SSH bruteforce (Triggered fail2ban)
2019-12-13 08:36:18
125.236.200.160 attackspam
TCP Port Scanning
2019-12-13 08:37:19
165.22.248.215 attackbotsspam
Dec 13 01:28:10 meumeu sshd[10134]: Failed password for root from 165.22.248.215 port 57206 ssh2
Dec 13 01:35:59 meumeu sshd[11222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.248.215 
Dec 13 01:36:01 meumeu sshd[11222]: Failed password for invalid user eldin from 165.22.248.215 port 38118 ssh2
...
2019-12-13 08:40:30
51.68.192.106 attack
Invalid user noahbryce from 51.68.192.106 port 41074
2019-12-13 08:14:10
71.6.232.2 attackspambots
firewall-block, port(s): 389/tcp
2019-12-13 08:27:24

Recently Reported IPs

192.3.157.121 155.4.254.197 85.173.114.248 155.4.163.116
155.230.185.124 185.98.80.136 60.13.146.20 185.98.80.134
155.185.4.81 140.213.2.227 111.218.200.163 100.140.187.201
202.152.154.202 118.137.46.65 157.212.85.174 33.79.58.27
178.6.3.198 53.66.39.29 118.101.175.93 128.93.254.178