Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.134.55.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.134.55.160.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:15:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 160.55.134.131.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.55.134.131.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
204.93.154.209 attackbotsspam
Unauthorized connection attempt detected from IP address 204.93.154.209 to port 22 [J]
2020-01-19 14:09:48
47.93.117.195 attack
Jan 19 05:56:49 pornomens sshd\[14645\]: Invalid user tesla from 47.93.117.195 port 51482
Jan 19 05:56:49 pornomens sshd\[14645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.93.117.195
Jan 19 05:56:51 pornomens sshd\[14645\]: Failed password for invalid user tesla from 47.93.117.195 port 51482 ssh2
...
2020-01-19 14:04:24
222.186.175.181 attackbotsspam
Failed password for root from 222.186.175.181 port 11473 ssh2
Failed password for root from 222.186.175.181 port 11473 ssh2
Failed password for root from 222.186.175.181 port 11473 ssh2
Failed password for root from 222.186.175.181 port 11473 ssh2
2020-01-19 14:01:39
94.191.108.37 attackbotsspam
Unauthorized connection attempt detected from IP address 94.191.108.37 to port 2220 [J]
2020-01-19 14:49:20
85.105.138.224 attackspam
unauthorized connection attempt
2020-01-19 14:51:27
193.179.108.131 attackbots
Unauthorized connection attempt detected from IP address 193.179.108.131 to port 80 [J]
2020-01-19 14:11:16
77.107.8.80 attackspam
Unauthorized connection attempt detected from IP address 77.107.8.80 to port 5555 [J]
2020-01-19 14:22:40
183.220.146.251 attackbotsspam
Jan 19 04:56:49 pi sshd[25210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.220.146.251  user=root
Jan 19 04:56:50 pi sshd[25210]: Failed password for invalid user root from 183.220.146.251 port 59917 ssh2
2020-01-19 14:04:40
31.149.33.86 attack
Unauthorized connection attempt detected from IP address 31.149.33.86 to port 22 [T]
2020-01-19 14:54:09
69.159.6.148 attackspam
Unauthorized connection attempt detected from IP address 69.159.6.148 to port 5555 [J]
2020-01-19 14:23:30
89.17.131.92 attack
Invalid user pi from 89.17.131.92 port 59300
2020-01-19 14:50:11
1.119.161.187 attackbotsspam
Unauthorized connection attempt detected from IP address 1.119.161.187 to port 1433 [J]
2020-01-19 14:54:52
178.252.170.198 attackbotsspam
Unauthorized connection attempt detected from IP address 178.252.170.198 to port 22 [J]
2020-01-19 14:13:59
112.80.138.109 attackspam
Unauthorized connection attempt detected from IP address 112.80.138.109 to port 80 [J]
2020-01-19 14:19:47
204.93.154.208 attack
Unauthorized connection attempt detected from IP address 204.93.154.208 to port 22 [J]
2020-01-19 14:10:17

Recently Reported IPs

55.25.210.198 12.66.137.152 232.40.193.184 18.131.88.79
68.41.28.54 66.60.191.164 55.189.193.79 56.236.127.97
243.25.243.159 85.53.94.169 172.255.98.61 207.132.253.205
167.224.18.91 17.54.157.173 104.140.70.57 231.200.153.123
120.9.151.178 173.254.141.227 103.179.28.191 31.142.224.191