Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.86.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.86.97.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:40:05 CST 2022
;; MSG SIZE  rcvd: 106
Host info
97.86.119.134.in-addr.arpa domain name pointer m24s20-7-33db.ispgateway.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.86.119.134.in-addr.arpa	name = m24s20-7-33db.ispgateway.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.133 attack
2019-08-07T13:12:21.236609Z 9bb9870d8bcb New connection: 218.92.0.133:19912 (172.17.0.3:2222) [session: 9bb9870d8bcb]
2019-08-07T13:12:59.762861Z bc5e350d09c5 New connection: 218.92.0.133:34931 (172.17.0.3:2222) [session: bc5e350d09c5]
2019-08-07 21:21:21
45.82.34.16 attack
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-08-07 21:05:41
177.36.58.182 attackbotsspam
2019-08-07T13:00:52.020955abusebot-6.cloudsearch.cf sshd\[20082\]: Invalid user nero from 177.36.58.182 port 40966
2019-08-07 21:18:57
103.38.194.139 attack
Aug  7 06:53:54 MK-Soft-VM5 sshd\[15204\]: Invalid user graham from 103.38.194.139 port 54060
Aug  7 06:53:54 MK-Soft-VM5 sshd\[15204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139
Aug  7 06:53:57 MK-Soft-VM5 sshd\[15204\]: Failed password for invalid user graham from 103.38.194.139 port 54060 ssh2
...
2019-08-07 21:11:11
113.161.62.162 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 06:31:17,859 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.161.62.162)
2019-08-07 21:27:42
85.236.165.254 attack
[portscan] Port scan
2019-08-07 21:17:17
220.92.16.66 attack
Aug  7 07:53:43 mail sshd\[15830\]: Failed password for invalid user git from 220.92.16.66 port 51038 ssh2
Aug  7 08:37:00 mail sshd\[16410\]: Invalid user matias from 220.92.16.66 port 48510
Aug  7 08:37:00 mail sshd\[16410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.92.16.66
...
2019-08-07 21:23:47
180.126.220.247 attackbotsspam
Aug 07 07:05:26 askasleikir sshd[9243]: Failed password for invalid user admin from 180.126.220.247 port 33706 ssh2
Aug 07 07:13:08 askasleikir sshd[9518]: Failed password for root from 180.126.220.247 port 33327 ssh2
Aug 07 07:14:43 askasleikir sshd[9566]: Failed password for invalid user nexthink from 180.126.220.247 port 40360 ssh2
2019-08-07 21:22:13
187.188.33.141 attack
Aug  7 13:09:44 amit sshd\[10377\]: Invalid user andrey from 187.188.33.141
Aug  7 13:09:44 amit sshd\[10377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.33.141
Aug  7 13:09:46 amit sshd\[10377\]: Failed password for invalid user andrey from 187.188.33.141 port 44995 ssh2
...
2019-08-07 20:47:54
1.197.132.39 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 06:33:43,602 INFO [amun_request_handler] PortScan Detected on Port: 445 (1.197.132.39)
2019-08-07 21:10:36
178.128.217.135 attackspambots
Repeated brute force against a port
2019-08-07 20:42:05
91.92.208.235 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 06:39:21,223 INFO [amun_request_handler] PortScan Detected on Port: 445 (91.92.208.235)
2019-08-07 20:46:48
159.192.202.195 attackbotsspam
Aug  6 15:19:17 our-server-hostname postfix/smtpd[27335]: connect from unknown[159.192.202.195]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.192.202.195
2019-08-07 21:06:50
49.249.232.190 attackbotsspam
19/8/7@08:44:36: FAIL: Alarm-Intrusion address from=49.249.232.190
...
2019-08-07 20:55:57
104.236.250.88 attack
SSH Bruteforce
2019-08-07 20:33:29

Recently Reported IPs

134.119.86.240 134.122.100.42 134.122.1.189 134.122.101.251
134.122.101.134 134.119.9.59 134.119.90.196 134.122.104.164
134.122.101.70 134.122.109.36 134.122.101.178 134.122.106.243
134.122.111.72 134.122.114.226 134.122.113.46 134.122.115.237
134.122.116.90 134.122.118.152 134.122.118.22 134.122.118.91