Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.0.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.0.41.			IN	A

;; AUTHORITY SECTION:
.			283	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 21:01:46 CST 2022
;; MSG SIZE  rcvd: 105
Host info
41.0.119.134.in-addr.arpa domain name pointer ms10420.ispgateway.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.0.119.134.in-addr.arpa	name = ms10420.ispgateway.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.115.167.58 attackspambots
Autoban   190.115.167.58 AUTH/CONNECT
2019-07-22 08:05:58
111.35.175.196 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-22 08:11:43
190.138.32.95 attack
Autoban   190.138.32.95 AUTH/CONNECT
2019-07-22 07:46:15
117.7.70.164 attack
Sun, 21 Jul 2019 18:27:32 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 07:35:35
103.115.206.251 attackspam
Sun, 21 Jul 2019 18:27:22 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 08:07:06
190.13.191.76 attackspambots
Autoban   190.13.191.76 AUTH/CONNECT
2019-07-22 07:53:56
111.85.51.226 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-22 07:51:58
190.121.195.54 attack
Autoban   190.121.195.54 AUTH/CONNECT
2019-07-22 07:58:12
103.255.5.26 attack
Sun, 21 Jul 2019 18:27:29 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 07:44:48
185.106.28.248 attack
Sun, 21 Jul 2019 18:27:28 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 07:47:43
101.231.104.82 attack
Jul 21 18:54:51 aat-srv002 sshd[25704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.104.82
Jul 21 18:54:53 aat-srv002 sshd[25704]: Failed password for invalid user ajmal from 101.231.104.82 port 35570 ssh2
Jul 21 18:59:02 aat-srv002 sshd[25783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.104.82
Jul 21 18:59:04 aat-srv002 sshd[25783]: Failed password for invalid user chris from 101.231.104.82 port 56058 ssh2
...
2019-07-22 08:04:00
190.135.237.161 attackspambots
Autoban   190.135.237.161 AUTH/CONNECT
2019-07-22 07:49:16
190.115.159.217 attackspam
Autoban   190.115.159.217 AUTH/CONNECT
2019-07-22 08:09:06
190.145.242.0 attackspam
Autoban   190.145.242.0 AUTH/CONNECT
2019-07-22 07:40:24
156.213.111.106 attack
Sun, 21 Jul 2019 18:27:26 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 07:50:28

Recently Reported IPs

134.119.0.181 134.106.87.73 134.119.0.32 134.119.0.22
134.119.0.30 134.119.0.141 134.119.0.42 104.21.94.208
134.119.0.8 134.119.0.57 134.119.0.82 134.119.100.223
134.119.105.198 134.119.116.121 134.119.12.186 134.119.122.185
134.119.118.192 134.119.17.226 134.119.178.113 134.119.10.108