Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.131.18.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.131.18.74.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:24:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 74.18.131.134.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 134.131.18.74.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.245.59.41 attack
Invalid user openlava from 157.245.59.41 port 51810
2020-03-22 08:52:39
180.76.179.213 attackspambots
leo_www
2020-03-22 09:08:59
88.156.122.72 attack
Invalid user shoutcast from 88.156.122.72 port 39158
2020-03-22 09:04:59
218.89.29.50 attackbots
Unauthorised access (Mar 21) SRC=218.89.29.50 LEN=44 TTL=52 ID=1748 TCP DPT=8080 WINDOW=1788 SYN 
Unauthorised access (Mar 20) SRC=218.89.29.50 LEN=44 TTL=52 ID=45097 TCP DPT=8080 WINDOW=1788 SYN 
Unauthorised access (Mar 18) SRC=218.89.29.50 LEN=44 TTL=52 ID=51500 TCP DPT=8080 WINDOW=28643 SYN
2020-03-22 09:01:32
185.175.93.101 attackspam
Mar 22 01:52:28 debian-2gb-nbg1-2 kernel: \[7097444.209675\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.101 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=58597 PROTO=TCP SPT=53746 DPT=5911 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-22 08:53:19
45.122.221.210 attackspambots
Invalid user centos from 45.122.221.210 port 34432
2020-03-22 08:28:30
52.15.253.230 attackbotsspam
Scanned 3 times in the last 24 hours on port 22
2020-03-22 09:00:03
118.24.21.83 attack
Invalid user steve from 118.24.21.83 port 42006
2020-03-22 09:02:19
139.199.20.202 attack
Mar 22 05:40:10 areeb-Workstation sshd[20038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.20.202 
Mar 22 05:40:12 areeb-Workstation sshd[20038]: Failed password for invalid user party from 139.199.20.202 port 49444 ssh2
...
2020-03-22 08:53:49
46.27.140.1 attackbotsspam
Brute-force attempt banned
2020-03-22 08:59:10
223.194.33.72 attack
frenzy
2020-03-22 08:46:47
14.23.81.42 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-03-22 08:33:20
107.173.51.222 attack
Automatic report - XMLRPC Attack
2020-03-22 08:47:44
60.175.124.8 attackbotsspam
1584824827 - 03/22/2020 04:07:07 Host: 60.175.124.8/60.175.124.8 Port: 23 TCP Blocked
...
2020-03-22 08:33:56
159.65.149.139 attackbotsspam
Mar 22 02:43:15 pkdns2 sshd\[18435\]: Invalid user minecraft from 159.65.149.139Mar 22 02:43:17 pkdns2 sshd\[18435\]: Failed password for invalid user minecraft from 159.65.149.139 port 60086 ssh2Mar 22 02:47:49 pkdns2 sshd\[18626\]: Invalid user fredportela from 159.65.149.139Mar 22 02:47:51 pkdns2 sshd\[18626\]: Failed password for invalid user fredportela from 159.65.149.139 port 52716 ssh2Mar 22 02:52:04 pkdns2 sshd\[18847\]: Invalid user chris from 159.65.149.139Mar 22 02:52:05 pkdns2 sshd\[18847\]: Failed password for invalid user chris from 159.65.149.139 port 42578 ssh2
...
2020-03-22 09:02:05

Recently Reported IPs

237.138.223.248 140.187.87.66 136.145.58.153 71.58.133.71
20.160.156.240 4.124.120.141 248.29.88.94 120.22.173.221
156.229.81.213 152.181.50.70 16.147.27.187 80.185.13.145
179.225.211.56 149.34.183.52 194.167.229.166 191.208.119.179
200.59.95.22 40.228.41.72 224.87.96.28 152.218.116.255