Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.86.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.86.196.			IN	A

;; AUTHORITY SECTION:
.			333	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 21:04:15 CST 2022
;; MSG SIZE  rcvd: 107
Host info
196.86.119.134.in-addr.arpa domain name pointer ms1awhosting.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.86.119.134.in-addr.arpa	name = ms1awhosting.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.116.10 attackspambots
Apr 18 15:43:05 piServer sshd[30669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.116.10 
Apr 18 15:43:07 piServer sshd[30669]: Failed password for invalid user ftpuser from 128.199.116.10 port 49409 ssh2
Apr 18 15:52:50 piServer sshd[31347]: Failed password for root from 128.199.116.10 port 40046 ssh2
...
2020-04-19 01:36:31
49.235.183.37 attackspambots
Apr 18 13:46:58 Tower sshd[19783]: Connection from 49.235.183.37 port 32998 on 192.168.10.220 port 22 rdomain ""
Apr 18 13:46:59 Tower sshd[19783]: Invalid user admin from 49.235.183.37 port 32998
Apr 18 13:46:59 Tower sshd[19783]: error: Could not get shadow information for NOUSER
Apr 18 13:46:59 Tower sshd[19783]: Failed password for invalid user admin from 49.235.183.37 port 32998 ssh2
Apr 18 13:46:59 Tower sshd[19783]: Received disconnect from 49.235.183.37 port 32998:11: Bye Bye [preauth]
Apr 18 13:46:59 Tower sshd[19783]: Disconnected from invalid user admin 49.235.183.37 port 32998 [preauth]
2020-04-19 01:48:21
159.89.188.167 attackspam
2020-04-18T16:47:22.516619sd-86998 sshd[40892]: Invalid user test from 159.89.188.167 port 59770
2020-04-18T16:47:22.522085sd-86998 sshd[40892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.188.167
2020-04-18T16:47:22.516619sd-86998 sshd[40892]: Invalid user test from 159.89.188.167 port 59770
2020-04-18T16:47:24.273281sd-86998 sshd[40892]: Failed password for invalid user test from 159.89.188.167 port 59770 ssh2
2020-04-18T16:52:21.206803sd-86998 sshd[41271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.188.167  user=root
2020-04-18T16:52:23.003423sd-86998 sshd[41271]: Failed password for root from 159.89.188.167 port 49208 ssh2
...
2020-04-19 01:32:00
111.229.111.160 attackspam
2020-04-18T18:31:57.134980rocketchat.forhosting.nl sshd[29741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.111.160  user=root
2020-04-18T18:31:59.000429rocketchat.forhosting.nl sshd[29741]: Failed password for root from 111.229.111.160 port 39308 ssh2
2020-04-18T18:37:55.653681rocketchat.forhosting.nl sshd[29881]: Invalid user vbox from 111.229.111.160 port 42376
...
2020-04-19 01:44:01
162.12.217.214 attackspam
leo_www
2020-04-19 01:31:37
121.224.149.138 attackbotsspam
Invalid user zs from 121.224.149.138 port 33152
2020-04-19 01:20:14
122.8.246.220 attackbotsspam
Invalid user admin from 122.8.246.220 port 38768
2020-04-19 01:19:40
171.244.51.114 attackbotsspam
$f2bV_matches
2020-04-19 01:30:41
95.85.38.127 attackbots
(sshd) Failed SSH login from 95.85.38.127 (NL/Netherlands/-): 5 in the last 3600 secs
2020-04-19 01:45:17
5.135.94.191 attackbotsspam
Apr 18 17:21:41 vps sshd[394727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-5-135-94.eu  user=root
Apr 18 17:21:43 vps sshd[394727]: Failed password for root from 5.135.94.191 port 44266 ssh2
Apr 18 17:26:52 vps sshd[419443]: Invalid user bd from 5.135.94.191 port 34672
Apr 18 17:26:52 vps sshd[419443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-5-135-94.eu
Apr 18 17:26:54 vps sshd[419443]: Failed password for invalid user bd from 5.135.94.191 port 34672 ssh2
...
2020-04-19 01:53:16
196.44.236.213 attackbotsspam
no
2020-04-19 01:26:18
113.173.48.166 attack
Invalid user user from 113.173.48.166 port 45832
2020-04-19 01:42:44
203.110.166.51 attackbotsspam
2020-04-18T12:02:54.244280abusebot-7.cloudsearch.cf sshd[15672]: Invalid user oq from 203.110.166.51 port 58524
2020-04-18T12:02:54.249843abusebot-7.cloudsearch.cf sshd[15672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.166.51
2020-04-18T12:02:54.244280abusebot-7.cloudsearch.cf sshd[15672]: Invalid user oq from 203.110.166.51 port 58524
2020-04-18T12:02:56.629495abusebot-7.cloudsearch.cf sshd[15672]: Failed password for invalid user oq from 203.110.166.51 port 58524 ssh2
2020-04-18T12:09:24.989829abusebot-7.cloudsearch.cf sshd[16009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.166.51  user=root
2020-04-18T12:09:26.576540abusebot-7.cloudsearch.cf sshd[16009]: Failed password for root from 203.110.166.51 port 58526 ssh2
2020-04-18T12:11:00.346689abusebot-7.cloudsearch.cf sshd[16094]: Invalid user test from 203.110.166.51 port 58528
...
2020-04-19 01:25:31
14.176.40.246 attackbotsspam
Invalid user admin from 14.176.40.246 port 54795
2020-04-19 01:52:26
119.139.199.169 attack
Lines containing failures of 119.139.199.169
Apr 17 11:09:22 icinga sshd[18483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169  user=r.r
Apr 17 11:09:24 icinga sshd[18483]: Failed password for r.r from 119.139.199.169 port 57084 ssh2
Apr 17 11:09:24 icinga sshd[18483]: Received disconnect from 119.139.199.169 port 57084:11: Bye Bye [preauth]
Apr 17 11:09:24 icinga sshd[18483]: Disconnected from authenticating user r.r 119.139.199.169 port 57084 [preauth]
Apr 17 11:21:07 icinga sshd[21716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169  user=r.r
Apr 17 11:21:09 icinga sshd[21716]: Failed password for r.r from 119.139.199.169 port 43960 ssh2
Apr 17 11:21:10 icinga sshd[21716]: Received disconnect from 119.139.199.169 port 43960:11: Bye Bye [preauth]
Apr 17 11:21:10 icinga sshd[21716]: Disconnected from authenticating user r.r 119.139.199.169 port 43960 [preau........
------------------------------
2020-04-19 01:39:46

Recently Reported IPs

134.119.86.244 134.119.50.87 134.119.96.62 134.122.105.122
134.119.9.121 104.219.54.78 134.122.110.216 134.122.107.78
134.122.110.243 134.119.86.222 134.122.136.3 134.122.163.43
134.122.123.42 134.122.12.193 134.122.0.95 134.122.129.179
134.122.104.29 134.122.167.70 134.122.178.45 134.122.18.176