Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
134.0.14.5 attackbotsspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-06-21 13:19:22
134.0.14.185 attack
Sql/code injection probe
2019-06-25 08:48:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.0.14.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.0.14.128.			IN	A

;; AUTHORITY SECTION:
.			186	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:16:55 CST 2022
;; MSG SIZE  rcvd: 105
Host info
128.14.0.134.in-addr.arpa domain name pointer vxhcg-23.srv.cat.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
128.14.0.134.in-addr.arpa	name = vxhcg-23.srv.cat.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
74.63.232.2 attackspam
Jul  8 04:10:54 nextcloud sshd\[18369\]: Invalid user fire from 74.63.232.2
Jul  8 04:10:54 nextcloud sshd\[18369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.232.2
Jul  8 04:10:56 nextcloud sshd\[18369\]: Failed password for invalid user fire from 74.63.232.2 port 54164 ssh2
...
2019-07-08 10:21:01
81.22.45.10 attackspambots
Port scan on 12 port(s): 3333 3344 3377 3379 3390 3402 3889 3900 4003 4489 6000 8888
2019-07-08 10:07:16
118.24.40.130 attackbotsspam
Jul  8 00:59:19 ns41 sshd[9826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.40.130
Jul  8 00:59:21 ns41 sshd[9826]: Failed password for invalid user deploy from 118.24.40.130 port 39554 ssh2
Jul  8 01:07:39 ns41 sshd[10555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.40.130
2019-07-08 10:04:37
45.55.47.149 attackbotsspam
SSH-BruteForce
2019-07-08 10:14:55
186.201.214.162 attackbots
2019-07-08T01:04:28.480397  sshd[32061]: Invalid user arjun from 186.201.214.162 port 52801
2019-07-08T01:04:28.495055  sshd[32061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.201.214.162
2019-07-08T01:04:28.480397  sshd[32061]: Invalid user arjun from 186.201.214.162 port 52801
2019-07-08T01:04:30.290465  sshd[32061]: Failed password for invalid user arjun from 186.201.214.162 port 52801 ssh2
2019-07-08T01:06:40.818242  sshd[32076]: Invalid user karla from 186.201.214.162 port 55553
...
2019-07-08 10:23:09
139.59.78.236 attackspambots
Jul  7 23:06:28 thevastnessof sshd[9202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.78.236
...
2019-07-08 10:26:36
111.38.46.183 attackspambots
Brute force attempt
2019-07-08 09:56:30
217.182.103.201 attackspambots
LGS,WP GET /wp-login.php
2019-07-08 10:22:50
178.132.217.18 attackbotsspam
Unauthorised access (Jul  8) SRC=178.132.217.18 LEN=40 TTL=246 ID=61846 TCP DPT=445 WINDOW=1024 SYN
2019-07-08 10:06:54
118.238.25.69 attackspambots
$f2bV_matches
2019-07-08 09:59:55
129.204.47.217 attackbotsspam
v+ssh-bruteforce
2019-07-08 10:03:10
198.245.61.119 attackspam
Automatic report - Web App Attack
2019-07-08 10:06:00
190.186.86.132 attackspambots
DATE:2019-07-08_01:07:10, IP:190.186.86.132, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-08 10:11:34
191.53.197.13 attackbotsspam
Unauthorized IMAP connection attempt.
2019-07-08 09:44:07
85.128.142.17 attackspambots
xmlrpc attack
2019-07-08 09:50:33

Recently Reported IPs

134.0.8.167 134.0.193.36 134.0.9.5 134.0.14.162
134.0.14.244 134.0.201.168 134.0.14.39 134.119.121.204
134.119.15.74 134.119.184.150 134.119.151.182 134.119.215.154
134.119.179.249 134.119.2.37 134.119.0.34 134.119.224.187
134.119.233.113 134.119.234.200 134.119.233.67 134.119.240.98