Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.122.128.0 - 134.122.255.255
CIDR:           134.122.128.0/17
NetName:        APNIC
NetHandle:      NET-134-122-128-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2019-11-11
Updated:        2019-11-11
Ref:            https://rdap.arin.net/registry/ip/134.122.128.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '134.122.192.0 - 134.122.255.255'

% Abuse contact for '134.122.192.0 - 134.122.255.255' is 'cs.mail@ctgserver.com'

inetnum:        134.122.192.0 - 134.122.255.255
netname:        CTG192-255-JP
descr:          CTG Server Ltd.
country:        HK
admin-c:        BCPL4-AP
tech-c:         BCPL4-AP
abuse-c:        AC2487-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-RCPL-SG
mnt-irt:        IRT-CTG-HK
last-modified:  2024-11-13T03:03:04Z
source:         APNIC

irt:            IRT-CTG-HK
address:        202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
e-mail:         cs.mail@ctgserver.com
abuse-mailbox:  cs.mail@ctgserver.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
auth:           # Filtered
remarks:        cs.mail@ctgserver.com
remarks:        cs.mail@ctgserver.com was validated on 2025-07-31
mnt-by:         MAINT-RCPL-SG
last-modified:  2025-11-18T00:34:04Z
source:         APNIC

role:           ABUSE CTGHK
country:        ZZ
address:        202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
phone:          +000000000
e-mail:         cs.mail@ctgserver.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
nic-hdl:        AC2487-AP
remarks:        Generated from irt object IRT-CTG-HK
remarks:        cs.mail@ctgserver.com was validated on 2025-07-31
abuse-mailbox:  cs.mail@ctgserver.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-31T03:16:34Z
source:         APNIC

role:           BGP CONSULTANCY PTE LTD administrator
address:        399 Chai Wan Road, Chai Wan, Hong Kong
country:        HK
phone:          +603-7806-1316
e-mail:         abuse@rackip.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
nic-hdl:        BCPL4-AP
mnt-by:         MAINT-RCPL-SG
last-modified:  2017-03-14T09:18:17Z
source:         APNIC

% Information related to '134.122.194.0/24AS152194'

route:          134.122.194.0/24
origin:         AS152194
descr:          RACKIP CONSULTANCY PTE. LTD.
                No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by:         MAINT-RCPL-SG
last-modified:  2024-03-23T14:02:59Z
source:         APNIC

% Information related to '134.122.194.0/24AS64050'

route:          134.122.194.0/24
origin:         AS64050
descr:          RACKIP CONSULTANCY PTE. LTD.
                No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by:         MAINT-RCPL-SG
last-modified:  2020-05-20T05:23:42Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.122.194.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19111
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.122.194.131.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012902 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 13:01:10 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 131.194.122.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.194.122.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.251.81.163 attackspam
23/tcp 23/tcp 23/tcp...
[2019-10-30]25pkt,1pt.(tcp)
2019-10-30 23:16:50
94.177.240.65 attackspam
22/tcp
[2019-10-30]1pkt
2019-10-30 22:46:48
188.18.53.48 attackbotsspam
Sniffing for wp-login
2019-10-30 23:09:59
86.107.12.15 attack
445/tcp 445/tcp
[2019-10-30]2pkt
2019-10-30 22:30:04
182.74.125.2 attackspam
445/tcp
[2019-10-30]1pkt
2019-10-30 23:02:48
222.186.175.169 attackbots
Oct 30 11:34:45 firewall sshd[21229]: Failed password for root from 222.186.175.169 port 12406 ssh2
Oct 30 11:34:45 firewall sshd[21229]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 12406 ssh2 [preauth]
Oct 30 11:34:45 firewall sshd[21229]: Disconnecting: Too many authentication failures [preauth]
...
2019-10-30 22:39:09
144.91.91.200 attackspambots
52869/tcp 52869/tcp 52869/tcp
[2019-10-30]3pkt
2019-10-30 22:33:52
133.130.119.178 attackspambots
Oct 30 11:52:50 work-partkepr sshd\[16408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.178  user=root
Oct 30 11:52:51 work-partkepr sshd\[16408\]: Failed password for root from 133.130.119.178 port 46904 ssh2
...
2019-10-30 22:37:15
61.19.22.217 attack
Oct 30 14:27:07 hcbbdb sshd\[3506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.22.217  user=root
Oct 30 14:27:09 hcbbdb sshd\[3506\]: Failed password for root from 61.19.22.217 port 36224 ssh2
Oct 30 14:32:03 hcbbdb sshd\[4025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.22.217  user=root
Oct 30 14:32:06 hcbbdb sshd\[4025\]: Failed password for root from 61.19.22.217 port 46984 ssh2
Oct 30 14:36:48 hcbbdb sshd\[4510\]: Invalid user Findlay from 61.19.22.217
2019-10-30 22:41:10
218.92.0.199 attack
Oct 30 14:59:17 venus sshd\[23762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Oct 30 14:59:19 venus sshd\[23762\]: Failed password for root from 218.92.0.199 port 55567 ssh2
Oct 30 14:59:21 venus sshd\[23762\]: Failed password for root from 218.92.0.199 port 55567 ssh2
...
2019-10-30 23:06:33
49.235.65.48 attack
Oct 30 04:04:21 web1 sshd\[15655\]: Invalid user eric2456 from 49.235.65.48
Oct 30 04:04:21 web1 sshd\[15655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.65.48
Oct 30 04:04:23 web1 sshd\[15655\]: Failed password for invalid user eric2456 from 49.235.65.48 port 38696 ssh2
Oct 30 04:10:24 web1 sshd\[16210\]: Invalid user niao123 from 49.235.65.48
Oct 30 04:10:24 web1 sshd\[16210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.65.48
2019-10-30 22:57:35
88.12.15.22 attackbots
Oct 30 15:13:07 master sshd[12976]: Failed password for invalid user support from 88.12.15.22 port 56172 ssh2
2019-10-30 23:10:32
117.2.234.162 attack
8728/tcp
[2019-10-30]1pkt
2019-10-30 22:52:53
124.13.147.167 attackbotsspam
Automatic report - Port Scan Attack
2019-10-30 23:11:13
218.161.112.40 attack
23/tcp
[2019-10-30]1pkt
2019-10-30 22:39:28

Recently Reported IPs

112.49.161.15 47.252.34.1 20.169.80.121 188.166.174.151
159.65.40.220 68.183.230.58 66.228.53.174 72.31.127.180
14.22.74.62 150.230.59.62 134.122.194.161 156.245.124.172
40.124.173.6 45.194.92.17 165.227.116.84 34.76.139.101
64.225.10.249 211.149.206.83 167.99.48.101 142.171.149.137