Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.129.183.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.129.183.70.			IN	A

;; AUTHORITY SECTION:
.			444	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:40:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
70.183.129.134.in-addr.arpa domain name pointer law.und.edu.
70.183.129.134.in-addr.arpa domain name pointer und-dev.und.edu.
70.183.129.134.in-addr.arpa domain name pointer undwritersconference.org.
70.183.129.134.in-addr.arpa domain name pointer www.engineering.und.edu.
70.183.129.134.in-addr.arpa domain name pointer engineering.und.edu.
70.183.129.134.in-addr.arpa domain name pointer www.med.und.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.183.129.134.in-addr.arpa	name = law.und.edu.
70.183.129.134.in-addr.arpa	name = und-dev.und.edu.
70.183.129.134.in-addr.arpa	name = undwritersconference.org.
70.183.129.134.in-addr.arpa	name = www.engineering.und.edu.
70.183.129.134.in-addr.arpa	name = engineering.und.edu.
70.183.129.134.in-addr.arpa	name = www.med.und.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.33.174 attackbotsspam
Jul  3 01:41:13 dedicated sshd[5286]: Invalid user user from 106.12.33.174 port 44452
2019-07-03 07:46:52
193.106.29.106 attack
firewall-block, port(s): 2211/tcp, 2213/tcp
2019-07-03 07:47:52
185.36.81.173 attackbots
Rude login attack (21 tries in 1d)
2019-07-03 07:42:31
14.169.232.42 attack
Lines containing failures of 14.169.232.42
Jul  3 01:14:30 srv02 sshd[21478]: Invalid user admin from 14.169.232.42 port 34593
Jul  3 01:14:30 srv02 sshd[21478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.169.232.42
Jul  3 01:14:32 srv02 sshd[21478]: Failed password for invalid user admin from 14.169.232.42 port 34593 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.169.232.42
2019-07-03 07:33:37
195.209.48.253 attack
[portscan] Port scan
2019-07-03 07:34:50
82.193.101.158 attackspambots
[portscan] Port scan
2019-07-03 07:43:03
198.108.66.27 attack
" "
2019-07-03 07:11:50
178.128.3.152 attackspam
" "
2019-07-03 07:37:11
122.195.200.99 attackbotsspam
02.07.2019 23:20:50 SSH access blocked by firewall
2019-07-03 07:44:47
185.36.81.166 attackspam
Rude login attack (22 tries in 1d)
2019-07-03 07:35:53
87.121.98.242 attack
Jul  2 19:21:00 web1 postfix/smtpd[30587]: warning: unknown[87.121.98.242]: SASL LOGIN authentication failed: authentication failure
...
2019-07-03 07:40:02
91.121.114.207 attackspambots
Rude login attack (4 tries in 1d)
2019-07-03 07:29:00
49.50.122.29 attack
Honeypot attack, port: 445, PTR: 49-50-122-29.raipur.datacenter.terapeer.com.
2019-07-03 07:09:30
104.216.171.35 attackbots
Jul  3 00:52:19 xxxxxxx0 sshd[21049]: Invalid user zimeip from 104.216.171.35 port 46554
Jul  3 00:52:19 xxxxxxx0 sshd[21049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.216.171.35
Jul  3 00:52:21 xxxxxxx0 sshd[21049]: Failed password for invalid user zimeip from 104.216.171.35 port 46554 ssh2
Jul  3 01:13:38 xxxxxxx0 sshd[24583]: Invalid user beheerder from 104.216.171.35 port 36054
Jul  3 01:13:38 xxxxxxx0 sshd[24583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.216.171.35

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.216.171.35
2019-07-03 07:25:57
52.166.176.229 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-03 07:16:18

Recently Reported IPs

134.129.134.238 134.129.211.2 134.129.141.26 134.130.15.160
134.139.19.17 134.147.51.42 134.153.232.61 134.158.39.131
134.147.64.10 134.158.33.75 134.159.210.121 134.159.210.111
134.161.7.207 134.158.39.133 134.146.83.23 134.169.105.160
134.17.17.139 134.17.16.133 134.169.9.1 134.17.17.170