Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.136.64.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.136.64.81.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:38:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 81.64.136.134.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 134.136.64.81.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
122.100.124.90 attackbotsspam
trying to access non-authorized port
2020-04-23 06:56:49
159.89.167.59 attackspambots
Invalid user lm from 159.89.167.59 port 54352
2020-04-23 07:06:46
45.14.150.51 attackspambots
Invalid user admin from 45.14.150.51 port 36840
2020-04-23 06:37:07
183.89.212.159 attackbots
Unauthorized SMTP/IMAP/POP3 connection attempt
2020-04-23 06:40:27
70.35.201.143 attackspam
Invalid user ox from 70.35.201.143 port 49748
2020-04-23 06:54:35
203.99.123.25 attack
proto=tcp  .  spt=46722  .  dpt=25  .     Found on   Dark List de      (395)
2020-04-23 07:00:50
178.128.162.10 attack
run attacks on the service SSH
2020-04-23 06:35:15
185.216.140.252 attack
firewall-block, port(s): 1482/tcp, 1486/tcp
2020-04-23 06:48:03
134.175.187.78 attackbotsspam
Invalid user cm from 134.175.187.78 port 38062
2020-04-23 06:47:19
122.51.24.177 attack
Invalid user an from 122.51.24.177 port 40366
2020-04-23 06:39:46
103.84.63.5 attack
Invalid user rp from 103.84.63.5 port 58886
2020-04-23 07:05:08
34.65.136.11 attackspam
[2020-04-22 17:47:20] NOTICE[1170] chan_sip.c: Registration from '' failed for '34.65.136.11:63872' - Wrong password
[2020-04-22 17:47:20] SECURITY[1184] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-04-22T17:47:20.451-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="202",SessionID="0x7f6c0825cda8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/34.65.136.11/63872",Challenge="782009e8",ReceivedChallenge="782009e8",ReceivedHash="585db8a61fdf825262992f6a45c02467"
[2020-04-22 17:47:20] NOTICE[1170] chan_sip.c: Registration from '' failed for '34.65.136.11:63876' - Wrong password
[2020-04-22 17:47:20] SECURITY[1184] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-04-22T17:47:20.451-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="202",SessionID="0x7f6c0824ccd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/34.65.136.11/63876",
...
2020-04-23 06:32:21
58.49.116.78 attack
proto=tcp  .  spt=32967  .  dpt=25  .     Found on   Blocklist de       (394)
2020-04-23 07:02:56
222.186.52.78 attack
Apr 23 00:15:28 * sshd[26625]: Failed password for root from 222.186.52.78 port 13123 ssh2
2020-04-23 06:59:12
103.104.122.149 attack
Invalid user enigma from 103.104.122.149 port 58644
2020-04-23 07:02:17

Recently Reported IPs

247.59.94.80 171.18.1.236 134.231.44.108 232.7.94.95
157.165.95.86 217.106.97.220 191.149.17.241 213.124.48.49
57.91.255.38 222.15.63.0 140.247.156.130 247.199.61.195
8.212.251.77 164.175.128.123 8.166.95.220 87.254.225.150
186.68.44.247 155.178.108.30 13.66.139.118 241.180.57.224