Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.86.14.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.86.14.134.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060901 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 10 05:19:35 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 134.14.86.132.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 132.86.14.134.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
196.43.78.53 attack
Consecutively exploits attack's from this IP-address.
2020-02-17 19:16:47
139.99.236.133 attack
Feb 17 06:17:34 vps647732 sshd[13303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.236.133
Feb 17 06:17:37 vps647732 sshd[13303]: Failed password for invalid user alpha from 139.99.236.133 port 50214 ssh2
...
2020-02-17 18:45:16
183.129.216.58 attackspam
$f2bV_matches
2020-02-17 18:48:56
74.15.17.153 attackbotsspam
Fail2Ban
2020-02-17 19:08:41
181.84.196.119 attackbotsspam
Automatic report - Port Scan Attack
2020-02-17 19:01:14
196.218.11.111 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 19:10:09
68.117.27.189 attackbotsspam
TCP Port Scanning
2020-02-17 18:41:50
189.234.168.142 attack
Feb 16 23:23:56 auw2 sshd\[14669\]: Invalid user ubuntu from 189.234.168.142
Feb 16 23:23:56 auw2 sshd\[14669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.234.168.142
Feb 16 23:23:59 auw2 sshd\[14669\]: Failed password for invalid user ubuntu from 189.234.168.142 port 47062 ssh2
Feb 16 23:27:14 auw2 sshd\[14972\]: Invalid user vnc from 189.234.168.142
Feb 16 23:27:14 auw2 sshd\[14972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.234.168.142
2020-02-17 18:57:21
128.199.179.123 attackbots
k+ssh-bruteforce
2020-02-17 18:49:28
14.63.169.33 attack
Feb 16 22:58:12 hpm sshd\[14289\]: Invalid user direction from 14.63.169.33
Feb 16 22:58:12 hpm sshd\[14289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33
Feb 16 22:58:14 hpm sshd\[14289\]: Failed password for invalid user direction from 14.63.169.33 port 45710 ssh2
Feb 16 23:01:34 hpm sshd\[14709\]: Invalid user arkserver from 14.63.169.33
Feb 16 23:01:34 hpm sshd\[14709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33
2020-02-17 18:54:59
104.47.10.33 attack
SSH login attempts.
2020-02-17 19:13:14
47.91.231.38 attackspambots
$f2bV_matches
2020-02-17 19:11:48
222.221.229.229 attackspam
Automatic report - Port Scan Attack
2020-02-17 18:41:23
196.218.107.8 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 19:14:32
173.254.29.42 attackspambots
SSH login attempts.
2020-02-17 18:53:24

Recently Reported IPs

123.166.213.117 26.36.152.75 174.117.192.161 208.85.69.121
162.18.87.239 219.87.198.186 240.192.54.233 5.34.110.177
30.113.164.225 117.15.61.80 207.75.16.6 5.152.71.42
34.99.251.90 245.108.213.32 18.140.102.92 47.164.188.191
40.73.56.236 76.209.223.17 77.40.122.239 216.219.21.82