Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.247.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.247.22.			IN	A

;; AUTHORITY SECTION:
.			102	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:17:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
22.247.119.134.in-addr.arpa domain name pointer m05s4-2-19da.ispgateway.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.247.119.134.in-addr.arpa	name = m05s4-2-19da.ispgateway.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.169.103 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-08 07:28:33
162.241.142.103 attackbotsspam
08/07/2020-16:25:01.385162 162.241.142.103 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-08-08 07:17:07
111.231.141.141 attackspambots
SSH Brute Force
2020-08-08 07:30:27
202.62.224.61 attack
Aug  8 00:45:37 server sshd[23676]: Failed password for root from 202.62.224.61 port 45529 ssh2
Aug  8 00:51:28 server sshd[25391]: Failed password for root from 202.62.224.61 port 34364 ssh2
Aug  8 00:57:21 server sshd[27242]: Failed password for root from 202.62.224.61 port 51433 ssh2
2020-08-08 07:41:39
123.205.161.245 attackspambots
Unauthorized connection attempt from IP address 123.205.161.245 on Port 445(SMB)
2020-08-08 07:35:21
94.191.11.96 attackbotsspam
2020-08-07T23:32:51.779907snf-827550 sshd[1643]: Failed password for root from 94.191.11.96 port 45480 ssh2
2020-08-07T23:37:33.055800snf-827550 sshd[1658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.11.96  user=root
2020-08-07T23:37:35.336202snf-827550 sshd[1658]: Failed password for root from 94.191.11.96 port 38620 ssh2
...
2020-08-08 07:30:51
122.234.58.53 attackspambots
SSH Brute Force
2020-08-08 07:42:20
103.246.240.26 attackspambots
Aug  7 23:21:49 *** sshd[1439]: User root from 103.246.240.26 not allowed because not listed in AllowUsers
2020-08-08 07:26:02
222.186.175.212 attackspambots
$f2bV_matches
2020-08-08 07:22:14
51.195.136.190 attackspambots
Multiple SSH login attempts.
2020-08-08 07:38:44
106.75.7.92 attack
$f2bV_matches
2020-08-08 07:32:32
89.216.102.123 attackspambots
Attempted Brute Force (dovecot)
2020-08-08 07:29:24
23.100.108.30 attack
ET SCAN Sipvicious Scan - port: 5060 proto: udp cat: Attempted Information Leakbytes: 446
2020-08-08 07:11:11
119.28.7.77 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-07T22:33:52Z and 2020-08-07T22:38:06Z
2020-08-08 07:26:56
187.235.8.101 attack
2020-08-07 15:24:50.490903-0500  localhost sshd[62004]: Failed password for root from 187.235.8.101 port 34118 ssh2
2020-08-08 07:16:07

Recently Reported IPs

134.119.234.174 134.119.240.106 134.119.249.26 134.119.253.165
134.119.253.180 134.119.253.193 134.119.253.197 134.119.253.79
134.119.253.207 134.119.35.232 134.119.29.129 134.119.44.37
134.119.40.38 134.119.253.60 134.119.45.140 241.150.219.30
134.119.45.166 134.119.45.159 134.119.45.213 134.119.86.229