Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.234.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.234.214.		IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 21:03:01 CST 2022
;; MSG SIZE  rcvd: 108
Host info
214.234.119.134.in-addr.arpa domain name pointer metis.ispgateway.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.234.119.134.in-addr.arpa	name = metis.ispgateway.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.248.169.127 attack
" "
2020-03-21 10:19:06
218.92.0.207 attack
Mar 21 02:13:10 eventyay sshd[8758]: Failed password for root from 218.92.0.207 port 52694 ssh2
Mar 21 02:13:12 eventyay sshd[8758]: Failed password for root from 218.92.0.207 port 52694 ssh2
Mar 21 02:13:14 eventyay sshd[8758]: Failed password for root from 218.92.0.207 port 52694 ssh2
...
2020-03-21 09:41:40
188.170.53.162 attack
Mar 21 02:09:12 ourumov-web sshd\[8568\]: Invalid user lucike from 188.170.53.162 port 43868
Mar 21 02:09:12 ourumov-web sshd\[8568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.53.162
Mar 21 02:09:13 ourumov-web sshd\[8568\]: Failed password for invalid user lucike from 188.170.53.162 port 43868 ssh2
...
2020-03-21 09:57:39
45.125.65.42 attack
Mar 21 02:33:04 srv01 postfix/smtpd\[10678\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 21 02:34:50 srv01 postfix/smtpd\[8466\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 21 02:35:24 srv01 postfix/smtpd\[10678\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 21 02:35:42 srv01 postfix/smtpd\[8466\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 21 02:49:55 srv01 postfix/smtpd\[10678\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-21 09:56:13
120.92.85.179 attackspam
2020-03-20T19:17:26.020666linuxbox-skyline sshd[30510]: Invalid user mazzella from 120.92.85.179 port 39764
...
2020-03-21 09:54:43
91.134.248.253 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-03-21 10:08:28
122.224.98.154 attackspambots
k+ssh-bruteforce
2020-03-21 09:46:04
118.24.101.182 attackbotsspam
Invalid user vivek from 118.24.101.182 port 47638
2020-03-21 10:00:04
66.212.25.186 attack
Automatic report - Banned IP Access
2020-03-21 10:00:25
71.6.233.120 attack
" "
2020-03-21 10:09:49
138.204.78.249 attackspam
Mar 20 23:05:49 * sshd[16536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.78.249
Mar 20 23:05:51 * sshd[16536]: Failed password for invalid user jsimon from 138.204.78.249 port 52670 ssh2
2020-03-21 09:58:09
192.241.238.187 attack
" "
2020-03-21 10:21:19
111.21.99.227 attackbots
SSH-BruteForce
2020-03-21 09:46:52
178.128.121.188 attack
5x Failed Password
2020-03-21 10:02:07
83.241.232.51 attackbotsspam
Mar 20 17:48:37 mockhub sshd[14613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.241.232.51
Mar 20 17:48:38 mockhub sshd[14613]: Failed password for invalid user aaa from 83.241.232.51 port 59004 ssh2
...
2020-03-21 10:16:48

Recently Reported IPs

243.104.4.208 134.119.24.29 134.119.240.144 134.119.241.137
134.119.241.171 134.119.240.6 134.119.240.1 134.119.240.27
104.219.248.95 104.219.248.97 49.93.235.147 134.119.244.174
134.119.245.25 134.119.244.147 134.119.247.59 104.219.250.28
134.119.247.15 134.119.253.127 134.119.241.38 134.119.249.34