Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
134.122.96.20 attackbots
Oct  6 21:27:02 haigwepa sshd[9530]: Failed password for root from 134.122.96.20 port 36314 ssh2
...
2020-10-07 04:05:22
134.122.96.20 attack
$f2bV_matches
2020-10-06 20:07:05
134.122.96.20 attackspam
$f2bV_matches
2020-09-17 18:52:02
134.122.96.20 attackspam
2020-09-10T04:53:06.230806yoshi.linuxbox.ninja sshd[120950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20
2020-09-10T04:53:06.224635yoshi.linuxbox.ninja sshd[120950]: Invalid user pma from 134.122.96.20 port 43954
2020-09-10T04:53:08.992948yoshi.linuxbox.ninja sshd[120950]: Failed password for invalid user pma from 134.122.96.20 port 43954 ssh2
...
2020-09-10 20:21:38
134.122.96.20 attackspambots
2020-09-10T04:02:58.032450ns386461 sshd\[26068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20  user=root
2020-09-10T04:03:00.325582ns386461 sshd\[26068\]: Failed password for root from 134.122.96.20 port 60192 ssh2
2020-09-10T04:11:20.752519ns386461 sshd\[1462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20  user=root
2020-09-10T04:11:22.960756ns386461 sshd\[1462\]: Failed password for root from 134.122.96.20 port 58798 ssh2
2020-09-10T04:14:17.952294ns386461 sshd\[4119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20  user=root
...
2020-09-10 12:11:41
134.122.96.20 attackbotsspam
Sep  9 20:37:38 eventyay sshd[3101]: Failed password for root from 134.122.96.20 port 41880 ssh2
Sep  9 20:41:04 eventyay sshd[3200]: Failed password for root from 134.122.96.20 port 47756 ssh2
...
2020-09-10 02:57:59
134.122.96.20 attack
Aug 31 21:09:26 plex-server sshd[2207530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20 
Aug 31 21:09:26 plex-server sshd[2207530]: Invalid user reward from 134.122.96.20 port 56616
Aug 31 21:09:28 plex-server sshd[2207530]: Failed password for invalid user reward from 134.122.96.20 port 56616 ssh2
Aug 31 21:13:06 plex-server sshd[2209198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20  user=root
Aug 31 21:13:08 plex-server sshd[2209198]: Failed password for root from 134.122.96.20 port 35258 ssh2
...
2020-09-01 05:51:28
134.122.96.20 attackspambots
2020-08-23T16:17:02.1412561495-001 sshd[9678]: Invalid user www from 134.122.96.20 port 43330
2020-08-23T16:17:04.3403081495-001 sshd[9678]: Failed password for invalid user www from 134.122.96.20 port 43330 ssh2
2020-08-23T16:20:17.7436801495-001 sshd[9825]: Invalid user anonymous from 134.122.96.20 port 51240
2020-08-23T16:20:17.7487131495-001 sshd[9825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20
2020-08-23T16:20:17.7436801495-001 sshd[9825]: Invalid user anonymous from 134.122.96.20 port 51240
2020-08-23T16:20:19.3822211495-001 sshd[9825]: Failed password for invalid user anonymous from 134.122.96.20 port 51240 ssh2
...
2020-08-24 05:29:41
134.122.96.20 attackspam
Aug 18 15:02:00 cho sshd[934844]: Failed password for invalid user zahid from 134.122.96.20 port 46000 ssh2
Aug 18 15:05:49 cho sshd[935014]: Invalid user dev from 134.122.96.20 port 54332
Aug 18 15:05:49 cho sshd[935014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20 
Aug 18 15:05:49 cho sshd[935014]: Invalid user dev from 134.122.96.20 port 54332
Aug 18 15:05:51 cho sshd[935014]: Failed password for invalid user dev from 134.122.96.20 port 54332 ssh2
...
2020-08-18 21:36:41
134.122.96.20 attack
Aug 18 08:51:59 ns382633 sshd\[8402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20  user=root
Aug 18 08:52:00 ns382633 sshd\[8402\]: Failed password for root from 134.122.96.20 port 39730 ssh2
Aug 18 09:07:36 ns382633 sshd\[10978\]: Invalid user mapr from 134.122.96.20 port 56714
Aug 18 09:07:36 ns382633 sshd\[10978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20
Aug 18 09:07:39 ns382633 sshd\[10978\]: Failed password for invalid user mapr from 134.122.96.20 port 56714 ssh2
2020-08-18 18:18:09
134.122.96.20 attack
Aug 15 16:12:57 vm1 sshd[5147]: Failed password for root from 134.122.96.20 port 55092 ssh2
...
2020-08-16 00:19:54
134.122.96.20 attack
Aug 12 12:39:22 jumpserver sshd[122990]: Failed password for root from 134.122.96.20 port 53842 ssh2
Aug 12 12:43:09 jumpserver sshd[123027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20  user=root
Aug 12 12:43:11 jumpserver sshd[123027]: Failed password for root from 134.122.96.20 port 36288 ssh2
...
2020-08-12 21:43:02
134.122.96.20 attackbotsspam
Aug  8 23:29:21 ip40 sshd[20892]: Failed password for root from 134.122.96.20 port 60610 ssh2
...
2020-08-09 05:33:33
134.122.96.20 attack
Aug  2 18:41:36 melroy-server sshd[32190]: Failed password for root from 134.122.96.20 port 43790 ssh2
...
2020-08-03 01:25:30
134.122.96.20 attackbotsspam
Jul 31 13:42:27 firewall sshd[2617]: Failed password for root from 134.122.96.20 port 37564 ssh2
Jul 31 13:46:20 firewall sshd[2755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.96.20  user=root
Jul 31 13:46:22 firewall sshd[2755]: Failed password for root from 134.122.96.20 port 48828 ssh2
...
2020-08-01 00:54:32
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.122.96.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.122.96.70.			IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 00:50:02 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 70.96.122.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.96.122.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.18.208.27 attack
Jul 18 02:10:34 plusreed sshd[18428]: Invalid user alfresco from 182.18.208.27
...
2019-07-18 14:15:06
36.89.39.106 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 02:51:11,685 INFO [shellcode_manager] (36.89.39.106) no match, writing hexdump (424c19f2192a7529e283467a2c8423e8 :2243292) - MS17010 (EternalBlue)
2019-07-18 13:45:06
157.230.123.70 attack
Jul 18 07:04:55 mail sshd\[30227\]: Invalid user zimbra from 157.230.123.70 port 37572
Jul 18 07:04:55 mail sshd\[30227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.123.70
Jul 18 07:04:58 mail sshd\[30227\]: Failed password for invalid user zimbra from 157.230.123.70 port 37572 ssh2
Jul 18 07:09:31 mail sshd\[31095\]: Invalid user tod from 157.230.123.70 port 37836
Jul 18 07:09:31 mail sshd\[31095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.123.70
2019-07-18 13:26:04
195.154.35.96 attack
SIP brute force
2019-07-18 14:20:30
73.158.98.62 attackbots
Invalid user oracle from 73.158.98.62 port 39862
2019-07-18 13:29:54
67.205.138.125 attack
Jul 18 06:41:31 microserver sshd[59466]: Invalid user tomcat from 67.205.138.125 port 36280
Jul 18 06:41:31 microserver sshd[59466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.125
Jul 18 06:41:33 microserver sshd[59466]: Failed password for invalid user tomcat from 67.205.138.125 port 36280 ssh2
Jul 18 06:49:01 microserver sshd[60298]: Invalid user radio from 67.205.138.125 port 47310
Jul 18 06:49:01 microserver sshd[60298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.125
Jul 18 07:03:24 microserver sshd[62300]: Invalid user scanner from 67.205.138.125 port 40324
Jul 18 07:03:24 microserver sshd[62300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.125
Jul 18 07:03:26 microserver sshd[62300]: Failed password for invalid user scanner from 67.205.138.125 port 40324 ssh2
Jul 18 07:10:49 microserver sshd[63535]: Invalid user user from 67.205.138.125 po
2019-07-18 14:06:50
117.90.94.79 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-18 13:39:56
185.234.218.251 attackbots
Rude login attack (38 tries in 1d)
2019-07-18 14:17:38
23.94.16.72 attack
Jul 18 07:31:50 ubuntu-2gb-nbg1-dc3-1 sshd[14048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.16.72
Jul 18 07:31:52 ubuntu-2gb-nbg1-dc3-1 sshd[14048]: Failed password for invalid user pbsdata from 23.94.16.72 port 60150 ssh2
...
2019-07-18 14:11:20
111.230.54.226 attackbots
2019-07-18T05:14:29.876372abusebot.cloudsearch.cf sshd\[30353\]: Invalid user remotos from 111.230.54.226 port 39682
2019-07-18 13:48:49
113.164.79.23 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-18 13:44:45
85.234.126.37 attackspambots
scan z
2019-07-18 13:38:51
122.114.236.178 attackbotsspam
Jul 18 07:16:45 mail sshd\[326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.236.178  user=nagios
Jul 18 07:16:47 mail sshd\[326\]: Failed password for nagios from 122.114.236.178 port 46742 ssh2
Jul 18 07:21:45 mail sshd\[1223\]: Invalid user five from 122.114.236.178 port 59032
Jul 18 07:21:45 mail sshd\[1223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.236.178
Jul 18 07:21:46 mail sshd\[1223\]: Failed password for invalid user five from 122.114.236.178 port 59032 ssh2
2019-07-18 13:26:21
206.189.166.172 attackspambots
Jul 18 07:22:50 * sshd[4460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.166.172
Jul 18 07:22:51 * sshd[4460]: Failed password for invalid user rumeno from 206.189.166.172 port 34578 ssh2
2019-07-18 14:02:22
185.176.26.104 attackspambots
Jul 18 08:10:07 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.176.26.104 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=59435 PROTO=TCP SPT=59029 DPT=47275 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-18 14:14:44

Recently Reported IPs

201.209.117.105 110.188.60.159 122.231.216.111 113.173.183.95
179.0.180.145 201.156.113.125 31.40.253.246 207.191.157.114
43.154.139.135 78.111.106.34 86.123.108.166 27.5.38.217
78.134.243.187 175.169.228.181 211.57.175.198 177.25.183.242
168.90.147.18 210.210.217.47 95.169.238.47 47.119.130.144