Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.134.42.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.134.42.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:22:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
136.42.134.12.in-addr.arpa domain name pointer 136.mui42.mmph.cgcil02r18.dsl.att.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.42.134.12.in-addr.arpa	name = 136.mui42.mmph.cgcil02r18.dsl.att.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.227.155.173 attack
Automatically reported by fail2ban report script (mx1)
2020-04-22 18:14:10
36.73.43.138 attackbots
honeypot 22 port
2020-04-22 18:08:34
103.14.34.37 attack
2020-04-22T10:50:33.775999vps773228.ovh.net sshd[2095]: Failed password for root from 103.14.34.37 port 53546 ssh2
2020-04-22T10:53:53.140188vps773228.ovh.net sshd[2123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.34.37  user=root
2020-04-22T10:53:55.458968vps773228.ovh.net sshd[2123]: Failed password for root from 103.14.34.37 port 57406 ssh2
2020-04-22T10:57:07.517593vps773228.ovh.net sshd[2183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.34.37  user=root
2020-04-22T10:57:09.469911vps773228.ovh.net sshd[2183]: Failed password for root from 103.14.34.37 port 33058 ssh2
...
2020-04-22 18:10:43
158.69.172.228 attack
$f2bV_matches
2020-04-22 18:01:23
117.176.240.100 attackspambots
Apr 22 07:43:30 prod4 vsftpd\[19626\]: \[anonymous\] FAIL LOGIN: Client "117.176.240.100"
Apr 22 07:43:38 prod4 vsftpd\[19655\]: \[www\] FAIL LOGIN: Client "117.176.240.100"
Apr 22 07:43:42 prod4 vsftpd\[19664\]: \[www\] FAIL LOGIN: Client "117.176.240.100"
Apr 22 07:43:50 prod4 vsftpd\[19669\]: \[www\] FAIL LOGIN: Client "117.176.240.100"
Apr 22 07:43:59 prod4 vsftpd\[19671\]: \[www\] FAIL LOGIN: Client "117.176.240.100"
...
2020-04-22 18:05:30
122.51.24.177 attack
Invalid user wu from 122.51.24.177 port 50758
2020-04-22 17:42:56
82.119.111.122 attack
(sshd) Failed SSH login from 82.119.111.122 (SK/Slovakia/82-119-111-122.static.chello.sk): 5 in the last 3600 secs
2020-04-22 18:15:33
69.94.156.8 attack
SpamScore above: 10.0
2020-04-22 17:40:47
181.52.172.107 attackbots
2020-04-22T03:37:18.925746linuxbox-skyline sshd[313905]: Invalid user tester from 181.52.172.107 port 34620
...
2020-04-22 17:53:31
113.175.60.48 attackbotsspam
nft/Honeypot/1122/38cdf
2020-04-22 18:04:56
121.201.17.102 attack
Port scan(s) denied
2020-04-22 17:42:03
183.236.79.229 attackspam
$f2bV_matches
2020-04-22 18:04:42
152.136.46.203 attackspam
Invalid user admin from 152.136.46.203 port 51722
2020-04-22 17:41:32
85.143.216.214 attackbots
$f2bV_matches
2020-04-22 17:47:03
183.56.218.62 attackspambots
5x Failed Password
2020-04-22 17:44:01

Recently Reported IPs

176.5.0.90 220.81.92.251 66.250.172.146 72.54.40.119
144.73.158.161 14.223.126.114 202.73.38.166 194.9.245.81
237.9.151.123 200.134.161.95 119.124.100.124 108.208.62.81
157.81.46.200 219.158.183.32 59.184.0.172 26.155.138.42
63.182.232.166 87.84.129.131 106.197.62.178 126.203.97.105