Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.109.184.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.109.184.106.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 12:58:11 CST 2025
;; MSG SIZE  rcvd: 108
Host info
106.184.109.134.in-addr.arpa domain name pointer lab-garage.informatik.tu-chemnitz.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.184.109.134.in-addr.arpa	name = lab-garage.informatik.tu-chemnitz.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.95.244 attackbots
2019-07-16T07:32:19.338907abusebot-4.cloudsearch.cf sshd\[27853\]: Invalid user russ from 139.59.95.244 port 52982
2019-07-16 15:46:05
177.129.204.34 attack
failed_logins
2019-07-16 15:32:54
198.1.78.124 attack
Automatic report - Banned IP Access
2019-07-16 15:42:07
209.85.166.68 attackspambots
Received: from source:[209.85.166.68] helo:mail-io1-f68.google.com
Return-Path: 
Message-ID: <5_____@mx.google.com>
From: Apple 
X-Google-Original-From: Apple <26412607@54668840.97510204.it>
Date: Mon, 15 Jul 2019 22:55:23 +0200
To: undisclosed-recipients:;
Subject: 支払いの問題でAppleIDがロックされました。 【 報告 】


http://aaappstoresidd06.ikanl.biz/
216.58.194.147
2607:f8b0:4000:812::2013

redirecting to

http://128.199.129.239/kopet
128.199.129.239

redirecting to

https://paypal-logins.org/repository1.php
138.68.247.144
2019-07-16 15:32:24
89.46.107.213 attackspambots
xmlrpc attack
2019-07-16 15:39:09
96.67.218.161 attack
Brute force attempt
2019-07-16 15:41:40
178.128.17.76 attack
Jul 16 02:41:33 vps200512 sshd\[28495\]: Invalid user gs from 178.128.17.76
Jul 16 02:41:33 vps200512 sshd\[28495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.17.76
Jul 16 02:41:35 vps200512 sshd\[28495\]: Failed password for invalid user gs from 178.128.17.76 port 57886 ssh2
Jul 16 02:48:51 vps200512 sshd\[28592\]: Invalid user mailman from 178.128.17.76
Jul 16 02:48:51 vps200512 sshd\[28592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.17.76
2019-07-16 16:10:42
73.2.139.100 attack
2019-07-16T08:19:38.587984abusebot-8.cloudsearch.cf sshd\[10381\]: Invalid user hadoop from 73.2.139.100 port 53138
2019-07-16 16:20:14
149.56.10.119 attackspambots
2019-07-16T07:19:33.157380abusebot-2.cloudsearch.cf sshd\[31997\]: Invalid user test from 149.56.10.119 port 35580
2019-07-16 15:34:12
219.153.33.162 attackbotsspam
Jul 16 09:34:59 mail sshd\[9157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.33.162  user=root
Jul 16 09:35:01 mail sshd\[9157\]: Failed password for root from 219.153.33.162 port 52106 ssh2
Jul 16 09:39:20 mail sshd\[10154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.33.162  user=root
Jul 16 09:39:22 mail sshd\[10154\]: Failed password for root from 219.153.33.162 port 40890 ssh2
Jul 16 09:43:41 mail sshd\[11069\]: Invalid user sean from 219.153.33.162 port 57909
Jul 16 09:43:41 mail sshd\[11069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.33.162
2019-07-16 15:50:53
113.108.140.114 attackbotsspam
2019-07-16T07:50:04.189463abusebot-3.cloudsearch.cf sshd\[5279\]: Invalid user toto from 113.108.140.114 port 38401
2019-07-16 16:04:17
124.65.217.10 attackspambots
2019-07-16T01:32:07.671445abusebot-5.cloudsearch.cf sshd\[27402\]: Invalid user lloyd from 124.65.217.10 port 36130
2019-07-16 15:47:48
123.18.153.143 attackbots
Unauthorized connection attempt from IP address 123.18.153.143 on Port 445(SMB)
2019-07-16 16:19:07
167.99.221.140 attack
2019-07-16T03:31:10.217128stark.klein-stark.info sshd\[11677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.221.140  user=root
2019-07-16T03:31:12.091211stark.klein-stark.info sshd\[11677\]: Failed password for root from 167.99.221.140 port 47916 ssh2
2019-07-16T03:31:12.512449stark.klein-stark.info sshd\[11681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.221.140  user=root
...
2019-07-16 15:33:28
198.23.189.18 attackspam
Jul 16 09:39:39 mail sshd\[10169\]: Invalid user miner from 198.23.189.18 port 46823
Jul 16 09:39:39 mail sshd\[10169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.189.18
Jul 16 09:39:41 mail sshd\[10169\]: Failed password for invalid user miner from 198.23.189.18 port 46823 ssh2
Jul 16 09:44:28 mail sshd\[11254\]: Invalid user docker from 198.23.189.18 port 46229
Jul 16 09:44:28 mail sshd\[11254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.189.18
2019-07-16 15:51:39

Recently Reported IPs

235.68.213.21 95.29.73.206 214.11.70.207 70.78.108.9
138.56.252.26 179.173.91.97 114.90.20.135 179.33.94.123
159.177.198.155 28.32.206.215 171.142.185.233 87.114.32.116
166.105.217.8 139.26.123.101 96.26.13.163 116.114.161.37
244.32.193.54 166.70.142.192 103.7.13.194 44.92.218.155