Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.117.195.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.117.195.155.		IN	A

;; AUTHORITY SECTION:
.			332	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 08:56:29 CST 2022
;; MSG SIZE  rcvd: 108
Host info
155.195.117.134.in-addr.arpa domain name pointer dhcp-195-155.aauc-labs.carleton.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
155.195.117.134.in-addr.arpa	name = dhcp-195-155.aauc-labs.carleton.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.97.218.164 attackspambots
Unauthorized connection attempt detected from IP address 183.97.218.164 to port 4567
2020-01-06 04:15:20
91.126.207.21 attackbots
Unauthorized connection attempt detected from IP address 91.126.207.21 to port 5555 [J]
2020-01-06 03:56:51
189.208.63.38 attackbots
Unauthorized connection attempt detected from IP address 189.208.63.38 to port 23
2020-01-06 03:44:28
213.81.148.201 attackspam
Unauthorized connection attempt detected from IP address 213.81.148.201 to port 80
2020-01-06 04:08:06
222.186.180.8 attack
Jan  5 10:04:27 sachi sshd\[8203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Jan  5 10:04:29 sachi sshd\[8203\]: Failed password for root from 222.186.180.8 port 9936 ssh2
Jan  5 10:04:32 sachi sshd\[8203\]: Failed password for root from 222.186.180.8 port 9936 ssh2
Jan  5 10:04:36 sachi sshd\[8203\]: Failed password for root from 222.186.180.8 port 9936 ssh2
Jan  5 10:04:46 sachi sshd\[8218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
2020-01-06 04:06:30
78.188.182.42 attack
Unauthorized connection attempt detected from IP address 78.188.182.42 to port 23 [J]
2020-01-06 03:59:22
185.42.128.99 attackbots
Unauthorized connection attempt detected from IP address 185.42.128.99 to port 23
2020-01-06 03:48:32
93.159.191.34 attackbotsspam
Unauthorized connection attempt detected from IP address 93.159.191.34 to port 7001
2020-01-06 03:55:53
208.74.182.221 attack
5555/tcp
[2020-01-05]1pkt
2020-01-06 04:09:05
201.109.2.35 attackspam
Automatic report - Port Scan Attack
2020-01-06 04:09:47
195.43.172.151 attackspambots
Unauthorized connection attempt detected from IP address 195.43.172.151 to port 80
2020-01-06 03:43:36
177.94.13.20 attackspam
Unauthorized connection attempt detected from IP address 177.94.13.20 to port 23
2020-01-06 03:49:57
178.253.12.66 attackspam
Unauthorized connection attempt detected from IP address 178.253.12.66 to port 1433
2020-01-06 03:49:27
190.48.99.128 attackbotsspam
Unauthorized connection attempt detected from IP address 190.48.99.128 to port 23
2020-01-06 04:12:38
150.109.230.219 attack
Unauthorized connection attempt detected from IP address 150.109.230.219 to port 2083 [J]
2020-01-06 03:51:33

Recently Reported IPs

45.154.148.208 56.218.11.94 245.239.16.77 159.93.125.241
141.38.187.1 174.49.91.238 209.129.92.221 167.0.12.72
92.83.181.28 222.34.124.56 100.87.30.177 39.65.182.107
75.54.17.255 22.139.43.193 82.165.194.36 45.86.161.49
175.138.110.129 251.2.2.170 73.99.253.53 192.12.155.93