Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.86.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.86.207.			IN	A

;; AUTHORITY SECTION:
.			463	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:40:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
207.86.119.134.in-addr.arpa domain name pointer m02s20-3-32db.ispgateway.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.86.119.134.in-addr.arpa	name = m02s20-3-32db.ispgateway.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.40.34.46 attackbots
2019-06-26T05:42:21.337619mail01 postfix/smtpd[29773]: warning: unknown[77.40.34.46]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26T05:50:19.309055mail01 postfix/smtpd[6244]: warning: unknown[77.40.34.46]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26T05:50:34.041435mail01 postfix/smtpd[9522]: warning: unknown[77.40.34.46]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26 13:42:55
157.230.43.68 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-26 13:41:53
89.107.227.227 attack
firewall-block, port(s): 445/tcp
2019-06-26 13:49:39
69.162.113.230 attackbotsspam
firewall-block, port(s): 445/tcp
2019-06-26 14:03:00
185.208.209.6 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-06-26 13:39:13
91.219.27.233 attack
[portscan] Port scan
2019-06-26 13:27:13
81.192.159.130 attackbotsspam
Jun 26 06:59:00 dev sshd\[20187\]: Invalid user teamspeak from 81.192.159.130 port 43062
Jun 26 06:59:00 dev sshd\[20187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.159.130
...
2019-06-26 13:20:43
163.44.152.127 attackbots
Scanning and Vuln Attempts
2019-06-26 13:24:51
159.65.143.166 attackbots
Scanning and Vuln Attempts
2019-06-26 14:11:15
74.63.250.6 attackspam
Brute force attempt
2019-06-26 13:22:57
79.137.46.233 attackspambots
xmlrpc attack
2019-06-26 13:25:11
187.147.78.54 attackspambots
Honeypot attack, port: 445, PTR: dsl-187-147-78-54-dyn.prod-infinitum.com.mx.
2019-06-26 14:09:54
79.2.210.178 attackbots
Jun 26 07:13:31 vps647732 sshd[32534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.2.210.178
Jun 26 07:13:33 vps647732 sshd[32534]: Failed password for invalid user stephan from 79.2.210.178 port 56289 ssh2
...
2019-06-26 13:44:22
163.44.206.165 attackbots
Scanning and Vuln Attempts
2019-06-26 13:19:57
1.202.91.252 attack
Jun 26 03:51:10 work-partkepr sshd\[5332\]: Invalid user cisco from 1.202.91.252 port 1754
Jun 26 03:51:10 work-partkepr sshd\[5332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.91.252
...
2019-06-26 13:24:30

Recently Reported IPs

134.119.86.167 134.119.86.203 134.119.86.17 134.119.86.240
134.119.86.97 134.122.100.42 134.122.1.189 134.122.101.251
134.122.101.134 134.119.9.59 134.119.90.196 134.122.104.164
134.122.101.70 134.122.109.36 134.122.101.178 134.122.106.243
134.122.111.72 134.122.114.226 134.122.113.46 134.122.115.237