Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.134.40.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.134.40.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 24 20:24:48 CST 2024
;; MSG SIZE  rcvd: 106
Host info
108.40.134.12.in-addr.arpa domain name pointer 108.wi40.kscy.cgcil02r18.dsl.att.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.40.134.12.in-addr.arpa	name = 108.wi40.kscy.cgcil02r18.dsl.att.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.186.73.140 attackspambots
Jul 11 06:55:00 lukav-desktop sshd\[30785\]: Invalid user gy from 139.186.73.140
Jul 11 06:55:00 lukav-desktop sshd\[30785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.73.140
Jul 11 06:55:02 lukav-desktop sshd\[30785\]: Failed password for invalid user gy from 139.186.73.140 port 40884 ssh2
Jul 11 06:57:20 lukav-desktop sshd\[30863\]: Invalid user mri from 139.186.73.140
Jul 11 06:57:20 lukav-desktop sshd\[30863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.73.140
2020-07-11 12:35:47
195.60.143.189 attackspambots
Port probing on unauthorized port 23
2020-07-11 12:24:50
84.208.137.213 attackspambots
Jul 11 05:57:39 ArkNodeAT sshd\[20574\]: Invalid user tit from 84.208.137.213
Jul 11 05:57:39 ArkNodeAT sshd\[20574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.208.137.213
Jul 11 05:57:41 ArkNodeAT sshd\[20574\]: Failed password for invalid user tit from 84.208.137.213 port 23954 ssh2
2020-07-11 12:18:25
222.186.15.158 attackbots
Wordpress malicious attack:[sshd]
2020-07-11 12:12:23
139.155.39.22 attack
(sshd) Failed SSH login from 139.155.39.22 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 11 05:39:23 amsweb01 sshd[19777]: Invalid user kirk from 139.155.39.22 port 36300
Jul 11 05:39:25 amsweb01 sshd[19777]: Failed password for invalid user kirk from 139.155.39.22 port 36300 ssh2
Jul 11 05:55:02 amsweb01 sshd[21996]: Invalid user openvpn from 139.155.39.22 port 47636
Jul 11 05:55:04 amsweb01 sshd[21996]: Failed password for invalid user openvpn from 139.155.39.22 port 47636 ssh2
Jul 11 05:57:32 amsweb01 sshd[22418]: Invalid user git from 139.155.39.22 port 45644
2020-07-11 12:23:44
193.35.51.13 attackbots
Jul 11 06:25:27 relay postfix/smtpd\[29119\]: warning: unknown\[193.35.51.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 06:43:02 relay postfix/smtpd\[31564\]: warning: unknown\[193.35.51.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 06:43:21 relay postfix/smtpd\[1268\]: warning: unknown\[193.35.51.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 06:44:22 relay postfix/smtpd\[1269\]: warning: unknown\[193.35.51.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 06:44:41 relay postfix/smtpd\[1268\]: warning: unknown\[193.35.51.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-11 12:45:51
201.97.121.134 attack
1594439859 - 07/11/2020 05:57:39 Host: 201.97.121.134/201.97.121.134 Port: 445 TCP Blocked
2020-07-11 12:17:17
85.209.0.204 attack
Jul 11 00:57:50 vps46666688 sshd[8573]: Failed password for root from 85.209.0.204 port 38448 ssh2
Jul 11 00:57:50 vps46666688 sshd[8574]: Failed password for root from 85.209.0.204 port 38466 ssh2
...
2020-07-11 12:05:20
35.223.35.181 attackspam
Trolling for resource vulnerabilities
2020-07-11 12:04:29
222.73.180.219 attack
Jul 11 05:48:44 sip sshd[900066]: Invalid user Anasztazia from 222.73.180.219 port 59788
Jul 11 05:48:45 sip sshd[900066]: Failed password for invalid user Anasztazia from 222.73.180.219 port 59788 ssh2
Jul 11 05:57:40 sip sshd[900194]: Invalid user testuser from 222.73.180.219 port 41155
...
2020-07-11 12:19:09
112.85.42.186 attack
Jul 11 10:01:23 dhoomketu sshd[1428238]: Failed password for root from 112.85.42.186 port 50715 ssh2
Jul 11 10:01:27 dhoomketu sshd[1428238]: Failed password for root from 112.85.42.186 port 50715 ssh2
Jul 11 10:01:29 dhoomketu sshd[1428238]: Failed password for root from 112.85.42.186 port 50715 ssh2
Jul 11 10:02:22 dhoomketu sshd[1428252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Jul 11 10:02:24 dhoomketu sshd[1428252]: Failed password for root from 112.85.42.186 port 30612 ssh2
...
2020-07-11 12:45:25
113.160.154.79 attack
Port Scan
...
2020-07-11 12:13:58
45.158.12.210 attackspam
" "
2020-07-11 12:25:08
132.145.159.137 attack
$f2bV_matches
2020-07-11 12:38:52
103.145.159.252 attackspam
Automatic report - XMLRPC Attack
2020-07-11 12:22:25

Recently Reported IPs

38.63.217.15 203.85.98.22 137.204.122.115 138.34.192.190
208.150.229.42 237.237.91.132 35.217.222.210 246.23.160.107
220.69.79.250 153.20.4.65 49.97.79.213 175.220.202.183
205.255.108.126 104.56.223.176 4.233.143.154 32.49.240.35
39.219.63.237 214.124.6.23 9.231.101.41 71.52.27.203