Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.214.134.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.214.134.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 17:56:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 4.134.214.131.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 131.214.134.4.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
112.35.62.225 attack
Aug  1 16:38:05 abendstille sshd\[5412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.62.225  user=root
Aug  1 16:38:07 abendstille sshd\[5412\]: Failed password for root from 112.35.62.225 port 46492 ssh2
Aug  1 16:41:42 abendstille sshd\[8769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.62.225  user=root
Aug  1 16:41:45 abendstille sshd\[8769\]: Failed password for root from 112.35.62.225 port 54598 ssh2
Aug  1 16:45:19 abendstille sshd\[12368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.62.225  user=root
...
2020-08-02 00:25:25
104.131.97.47 attackbots
sshd
2020-08-02 00:52:30
27.221.97.4 attackspambots
Aug  1 21:12:45 itv-usvr-01 sshd[28104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.4  user=root
Aug  1 21:12:47 itv-usvr-01 sshd[28104]: Failed password for root from 27.221.97.4 port 56516 ssh2
Aug  1 21:16:53 itv-usvr-01 sshd[28281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.4  user=root
Aug  1 21:16:55 itv-usvr-01 sshd[28281]: Failed password for root from 27.221.97.4 port 49546 ssh2
Aug  1 21:20:42 itv-usvr-01 sshd[28437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.4  user=root
Aug  1 21:20:43 itv-usvr-01 sshd[28437]: Failed password for root from 27.221.97.4 port 40463 ssh2
2020-08-02 00:17:36
182.151.15.175 attackbots
Tried sshing with brute force.
2020-08-02 00:42:12
157.245.124.160 attackbots
Aug  1 15:20:51 rancher-0 sshd[707978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.124.160  user=root
Aug  1 15:20:53 rancher-0 sshd[707978]: Failed password for root from 157.245.124.160 port 53334 ssh2
...
2020-08-02 00:07:31
84.17.51.142 attack
(From no-replynen@google.com) Gооd dаy! 
If you want to get ahead of your competition, have a higher Domain Authority score. Its just simple as that. 
With our service you get Domain Authority above 50 points in just 30 days. 
 
This service is guaranteed 
 
For more information, check our service here 
https://www.monkeydigital.co/Get-Guaranteed-Domain-Authority-50/ 
 
thank you 
Mike Ogden
 
Monkey Digital 
support@monkeydigital.co
2020-08-02 00:11:49
177.124.40.7 attack
Unauthorised access (Aug  1) SRC=177.124.40.7 LEN=40 TTL=242 ID=39626 TCP DPT=445 WINDOW=1024 SYN
2020-08-01 23:59:21
68.65.121.177 attackbotsspam
/old/wp-admin/
2020-08-02 00:24:06
162.241.200.72 attackbots
 TCP (SYN) 162.241.200.72:59889 -> port 1920, len 44
2020-08-02 00:49:26
111.67.203.24 attackspam
Aug  1 17:42:10 mout sshd[21600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.203.24  user=root
Aug  1 17:42:12 mout sshd[21600]: Failed password for root from 111.67.203.24 port 33672 ssh2
2020-08-02 00:35:46
112.212.60.88 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 00:13:53
190.134.61.211 attackspam
Email rejected due to spam filtering
2020-08-02 00:46:11
217.133.58.148 attackspambots
SSH Brute-Force attacks
2020-08-02 00:26:18
119.166.28.82 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 00:33:05
154.238.18.79 attackspambots
2020-08-01 04:34:32,131 fail2ban.actions        [524]: NOTICE  [wordpress-beatrice-main] Ban 154.238.18.79
2020-08-01 05:47:03,434 fail2ban.actions        [524]: NOTICE  [wordpress-beatrice-main] Ban 154.238.18.79
2020-08-01 15:19:32,048 fail2ban.actions        [524]: NOTICE  [wordpress-beatrice-main] Ban 154.238.18.79
...
2020-08-02 00:32:09

Recently Reported IPs

91.188.1.125 241.161.221.225 92.69.104.47 209.84.75.99
192.94.54.167 89.140.58.56 249.229.144.172 245.120.191.203
68.13.29.252 22.32.152.114 148.42.143.200 125.233.165.231
98.170.169.223 44.236.250.146 224.81.157.227 97.199.125.180
109.241.29.215 87.5.183.107 204.0.52.60 189.49.120.81