Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.253.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55086
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.253.159.		IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:39:57 CST 2022
;; MSG SIZE  rcvd: 108
Host info
159.253.119.134.in-addr.arpa domain name pointer arvensis.ispgateway.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.253.119.134.in-addr.arpa	name = arvensis.ispgateway.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.69.230.114 attackspam
Automatic report - Port Scan Attack
2020-03-04 02:13:06
103.7.8.201 attackbotsspam
[Tue Dec 31 16:26:11.023059 2019] [access_compat:error] [pid 8591] [client 103.7.8.201:46494] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php
...
2020-03-04 02:18:42
143.255.40.30 attackbots
Dec 17 00:13:19 mercury auth[21215]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=143.255.40.30
...
2020-03-04 01:55:51
106.13.63.41 attack
Brute-force attempt banned
2020-03-04 02:14:51
14.63.167.192 attack
$f2bV_matches
2020-03-04 02:16:15
103.127.65.40 attackspam
Jan  5 19:09:18 mercury wordpress(www.learnargentinianspanish.com)[25692]: XML-RPC authentication failure for josh from 103.127.65.40
...
2020-03-04 01:59:13
104.152.52.39 attackspambots
Nov 28 16:47:24 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:5a:1a:41:08:00 SRC=104.152.52.39 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=243 ID=1141 PROTO=UDP SPT=59552 DPT=123 LEN=56 
...
2020-03-04 02:29:47
103.197.48.98 attack
Dec 17 13:16:53 mercury wordpress(www.learnargentinianspanish.com)[8453]: XML-RPC authentication attempt for unknown user silvina from 103.197.48.98
...
2020-03-04 02:23:55
154.9.161.211 attackbots
LAMP,DEF GET http://meyer-pants.com/magmi/web/magmi.php
2020-03-04 02:08:32
103.103.128.201 attackspam
2019-11-30T23:33:12.107Z CLOSE host=103.103.128.201 port=42086 fd=4 time=20.020 bytes=20
...
2020-03-04 02:02:47
139.99.84.85 attack
Mar  3 19:25:11 MK-Soft-Root1 sshd[9345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.84.85 
Mar  3 19:25:13 MK-Soft-Root1 sshd[9345]: Failed password for invalid user elsearch from 139.99.84.85 port 49242 ssh2
...
2020-03-04 02:29:04
101.52.140.34 attackspambots
Mar  3 15:20:38 mail sshd\[4273\]: Invalid user hduser from 101.52.140.34
Mar  3 15:20:38 mail sshd\[4273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.52.140.34
Mar  3 15:20:40 mail sshd\[4273\]: Failed password for invalid user hduser from 101.52.140.34 port 29409 ssh2
...
2020-03-04 02:33:49
113.64.92.19 attackbotsspam
Jan 23 22:36:29 mercury smtpd[1181]: 7f951e37bd386b47 smtp event=failed-command address=113.64.92.19 host=113.64.92.19 command="RCPT TO:" result="550 Invalid recipient"
...
2020-03-04 02:10:00
123.20.25.109 attackspambots
Jan 19 02:20:50 mercury auth[10049]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=123.20.25.109
...
2020-03-04 02:17:20
103.86.50.211 attack
High volume WP login attempts -cou
2020-03-04 02:03:09

Recently Reported IPs

134.119.253.128 134.119.253.135 134.119.253.133 134.119.253.187
134.119.253.43 134.119.253.85 134.119.253.182 134.119.37.48
134.119.30.73 134.119.39.13 134.119.33.134 134.119.253.99
134.119.45.105 134.119.45.196 134.119.45.56 134.119.45.28
134.119.45.76 134.119.62.60 134.119.86.102 134.119.86.167