Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.34.13.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.34.13.138.			IN	A

;; AUTHORITY SECTION:
.			517	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:19:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 138.13.34.117.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 117.34.13.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
186.84.172.25 attackspambots
Aug  3 06:36:37 abendstille sshd\[7860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.25  user=root
Aug  3 06:36:39 abendstille sshd\[7860\]: Failed password for root from 186.84.172.25 port 35568 ssh2
Aug  3 06:39:26 abendstille sshd\[10567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.25  user=root
Aug  3 06:39:28 abendstille sshd\[10567\]: Failed password for root from 186.84.172.25 port 44248 ssh2
Aug  3 06:42:07 abendstille sshd\[13456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.25  user=root
...
2020-08-03 15:59:33
14.215.116.6 attack
Aug  3 07:43:55 OPSO sshd\[1077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.116.6  user=root
Aug  3 07:43:57 OPSO sshd\[1077\]: Failed password for root from 14.215.116.6 port 59127 ssh2
Aug  3 07:48:00 OPSO sshd\[2237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.116.6  user=root
Aug  3 07:48:02 OPSO sshd\[2237\]: Failed password for root from 14.215.116.6 port 53521 ssh2
Aug  3 07:51:54 OPSO sshd\[3820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.116.6  user=root
2020-08-03 15:54:32
13.88.247.112 attack
spam (f2b h2)
2020-08-03 16:05:35
4.53.147.50 attackbotsspam
server log
2020-08-03 16:01:51
45.172.99.31 attack
(smtpauth) Failed SMTP AUTH login from 45.172.99.31 (BR/Brazil/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-03 08:22:49 plain authenticator failed for ([45.172.99.31]) [45.172.99.31]: 535 Incorrect authentication data (set_id=info@atlaspumpsepahan.com)
2020-08-03 16:22:20
186.210.92.196 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-03 16:18:57
203.113.102.178 attackbotsspam
(imapd) Failed IMAP login from 203.113.102.178 (TH/Thailand/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug  3 08:22:57 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 10 secs): user=, method=PLAIN, rip=203.113.102.178, lip=5.63.12.44, session=<5hpkEvGrmZjLcWay>
2020-08-03 16:15:20
165.22.216.238 attack
$f2bV_matches
2020-08-03 16:14:25
45.55.222.162 attackbots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-03 16:01:17
122.51.91.191 attackbots
$f2bV_matches
2020-08-03 15:59:14
177.134.147.124 attackbots
Automatic report - Port Scan Attack
2020-08-03 15:57:54
13.80.15.75 attack
Aug  3 11:22:43 ift sshd\[41564\]: Failed password for root from 13.80.15.75 port 50202 ssh2Aug  3 11:22:58 ift sshd\[41603\]: Invalid user oracle from 13.80.15.75Aug  3 11:22:59 ift sshd\[41603\]: Failed password for invalid user oracle from 13.80.15.75 port 37990 ssh2Aug  3 11:23:17 ift sshd\[41609\]: Failed password for root from 13.80.15.75 port 54016 ssh2Aug  3 11:23:31 ift sshd\[41631\]: Invalid user postgres from 13.80.15.75
...
2020-08-03 16:27:48
75.134.60.248 attackbots
Aug  3 09:43:25 [host] sshd[13936]: pam_unix(sshd:
Aug  3 09:43:27 [host] sshd[13936]: Failed passwor
Aug  3 09:47:47 [host] sshd[14108]: pam_unix(sshd:
2020-08-03 16:05:17
177.139.195.214 attack
port scan and connect, tcp 23 (telnet)
2020-08-03 16:21:30
222.110.165.141 attack
2020-08-03T01:44:36.507878linuxbox-skyline sshd[44695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.110.165.141  user=root
2020-08-03T01:44:38.639878linuxbox-skyline sshd[44695]: Failed password for root from 222.110.165.141 port 57172 ssh2
...
2020-08-03 15:53:14

Recently Reported IPs

117.32.92.220 117.34.13.132 117.32.92.93 117.34.13.140
117.33.13.28 117.34.13.139 117.34.13.142 117.34.13.143
117.34.13.206 117.34.13.32 117.34.13.42 117.34.13.47
117.34.13.48 117.34.13.58 117.34.13.57 117.34.13.207
117.34.13.8 117.34.13.85 117.34.13.80 117.34.13.89