Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
134.119.45.69 attackbots
REQUESTED PAGE: /backup/wp-admin/
2020-09-01 18:36:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.45.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.45.114.			IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 179 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:50:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
114.45.119.134.in-addr.arpa domain name pointer selma.ispgateway.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.45.119.134.in-addr.arpa	name = selma.ispgateway.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.97.20.164 attackbotsspam
[Thu Jul 09 23:29:21 2020] - DDoS Attack From IP: 83.97.20.164 Port: 27189
2020-07-15 04:13:22
52.149.134.171 attack
Jul 14 20:27:51 odroid64 sshd\[25506\]: Invalid user 123 from 52.149.134.171
Jul 14 20:27:51 odroid64 sshd\[25506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.149.134.171
...
2020-07-15 03:49:39
59.127.99.165 attack
Honeypot attack, port: 81, PTR: 59-127-99-165.HINET-IP.hinet.net.
2020-07-15 03:54:05
139.59.59.102 attack
Jul 14 20:21:57 ns382633 sshd\[9625\]: Invalid user cluster from 139.59.59.102 port 50792
Jul 14 20:21:57 ns382633 sshd\[9625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.102
Jul 14 20:21:59 ns382633 sshd\[9625\]: Failed password for invalid user cluster from 139.59.59.102 port 50792 ssh2
Jul 14 20:27:40 ns382633 sshd\[10471\]: Invalid user btt from 139.59.59.102 port 57568
Jul 14 20:27:40 ns382633 sshd\[10471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.102
2020-07-15 04:10:37
106.124.137.130 attack
Jul 14 22:09:45 home sshd[4071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.137.130
Jul 14 22:09:47 home sshd[4071]: Failed password for invalid user lty from 106.124.137.130 port 58123 ssh2
Jul 14 22:12:23 home sshd[4314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.137.130
...
2020-07-15 04:17:58
20.46.41.158 attackspambots
Jul 14 23:16:45 master sshd[7802]: Failed password for invalid user user1 from 20.46.41.158 port 31151 ssh2
2020-07-15 04:19:42
159.89.236.71 attackbots
Jul 14 22:30:34 lukav-desktop sshd\[27865\]: Invalid user toms from 159.89.236.71
Jul 14 22:30:34 lukav-desktop sshd\[27865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.236.71
Jul 14 22:30:36 lukav-desktop sshd\[27865\]: Failed password for invalid user toms from 159.89.236.71 port 33374 ssh2
Jul 14 22:33:49 lukav-desktop sshd\[27881\]: Invalid user zzh from 159.89.236.71
Jul 14 22:33:49 lukav-desktop sshd\[27881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.236.71
2020-07-15 04:23:44
175.24.102.249 attack
Jul 14 15:36:16 george sshd[29090]: Failed password for invalid user cubes from 175.24.102.249 port 47988 ssh2
Jul 14 15:39:18 george sshd[29242]: Invalid user jian from 175.24.102.249 port 55408
Jul 14 15:39:18 george sshd[29242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.102.249 
Jul 14 15:39:21 george sshd[29242]: Failed password for invalid user jian from 175.24.102.249 port 55408 ssh2
Jul 14 15:42:22 george sshd[29295]: Invalid user zabbix from 175.24.102.249 port 34588
...
2020-07-15 03:50:41
62.28.253.197 attack
Jul 14 21:32:50 odroid64 sshd\[28403\]: Invalid user mukund from 62.28.253.197
Jul 14 21:32:50 odroid64 sshd\[28403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.253.197
...
2020-07-15 03:48:10
51.11.136.109 attackspambots
Jul 14 20:27:39 ns381471 sshd[25585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.11.136.109
Jul 14 20:27:40 ns381471 sshd[25585]: Failed password for invalid user 123 from 51.11.136.109 port 58609 ssh2
2020-07-15 04:13:45
71.6.146.185 attackbotsspam
Unauthorized connection attempt detected from IP address 71.6.146.185 to port 9151
2020-07-15 04:24:26
145.239.95.241 attackspam
Jul 14 19:41:09 ns3033917 sshd[12381]: Invalid user hz from 145.239.95.241 port 32810
Jul 14 19:41:11 ns3033917 sshd[12381]: Failed password for invalid user hz from 145.239.95.241 port 32810 ssh2
Jul 14 19:47:22 ns3033917 sshd[12433]: Invalid user admin from 145.239.95.241 port 60786
...
2020-07-15 03:57:50
103.84.71.238 attackbots
Jul 14 21:32:39 vps639187 sshd\[6931\]: Invalid user varga from 103.84.71.238 port 60424
Jul 14 21:32:39 vps639187 sshd\[6931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.71.238
Jul 14 21:32:40 vps639187 sshd\[6931\]: Failed password for invalid user varga from 103.84.71.238 port 60424 ssh2
...
2020-07-15 04:04:39
13.92.134.72 attackspambots
Jul 14 20:27:32 zooi sshd[8007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.92.134.72
Jul 14 20:27:34 zooi sshd[8007]: Failed password for invalid user 123 from 13.92.134.72 port 28095 ssh2
...
2020-07-15 04:16:51
106.12.196.118 attackspambots
Jul 14 21:31:04 nextcloud sshd\[22011\]: Invalid user erika from 106.12.196.118
Jul 14 21:31:04 nextcloud sshd\[22011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.196.118
Jul 14 21:31:05 nextcloud sshd\[22011\]: Failed password for invalid user erika from 106.12.196.118 port 33948 ssh2
2020-07-15 04:07:46

Recently Reported IPs

134.119.45.115 134.119.45.129 134.119.45.155 134.119.45.137
134.119.45.156 118.172.97.158 134.119.45.172 134.119.45.176
134.119.45.182 134.119.45.179 134.119.45.187 134.119.45.198
134.119.45.189 134.119.45.207 134.119.45.202 134.119.45.208
134.119.45.229 134.119.45.227 118.173.101.188 118.173.101.190