Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.14.196.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24579
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.14.196.101.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 01:04:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 101.196.14.134.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 134.14.196.101.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
128.199.88.188 attackspambots
$f2bV_matches
2020-06-23 02:48:10
14.198.15.220 attackbotsspam
Honeypot attack, port: 5555, PTR: 014198015220.ctinets.com.
2020-06-23 03:08:28
63.221.157.162 attackspam
Unauthorized connection attempt from IP address 63.221.157.162 on Port 445(SMB)
2020-06-23 03:19:24
211.24.107.72 attack
Unauthorized connection attempt from IP address 211.24.107.72 on Port 445(SMB)
2020-06-23 03:15:03
179.198.127.36 attackbotsspam
20/6/22@08:01:59: FAIL: Alarm-Intrusion address from=179.198.127.36
...
2020-06-23 02:49:56
103.81.115.71 attackspam
Unauthorized connection attempt detected from IP address 103.81.115.71 to port 445
2020-06-23 02:56:31
5.178.194.239 attack
Unauthorized connection attempt from IP address 5.178.194.239 on Port 445(SMB)
2020-06-23 02:54:38
138.68.226.175 attack
k+ssh-bruteforce
2020-06-23 02:43:46
60.170.166.177 attackspambots
 TCP (SYN) 60.170.166.177:50310 -> port 23, len 44
2020-06-23 02:45:06
117.240.182.194 attackbots
Unauthorized connection attempt from IP address 117.240.182.194 on Port 445(SMB)
2020-06-23 02:40:59
217.182.204.34 attackbotsspam
Jun 22 18:21:30 game-panel sshd[21470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.204.34
Jun 22 18:21:31 game-panel sshd[21470]: Failed password for invalid user postgres from 217.182.204.34 port 41420 ssh2
Jun 22 18:24:18 game-panel sshd[21598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.204.34
2020-06-23 02:49:04
159.192.143.249 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-23 03:18:35
87.101.72.81 attackbots
Jun 22 15:03:16 eventyay sshd[23536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.72.81
Jun 22 15:03:18 eventyay sshd[23536]: Failed password for invalid user rsync from 87.101.72.81 port 50203 ssh2
Jun 22 15:07:56 eventyay sshd[23686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.72.81
...
2020-06-23 03:11:49
112.3.30.15 attack
Invalid user xuxijun from 112.3.30.15 port 58696
2020-06-23 02:50:51
106.13.217.102 attackbotsspam
Jun 22 20:14:01 dev0-dcde-rnet sshd[10316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.217.102
Jun 22 20:14:02 dev0-dcde-rnet sshd[10316]: Failed password for invalid user ftp from 106.13.217.102 port 59892 ssh2
Jun 22 20:22:31 dev0-dcde-rnet sshd[10363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.217.102
2020-06-23 03:19:07

Recently Reported IPs

132.80.130.235 169.33.171.143 168.16.41.221 126.62.127.121
240.77.111.65 236.146.155.175 124.163.153.16 209.24.134.126
124.204.80.237 9.94.27.178 73.53.75.65 129.150.92.28
24.126.32.117 30.68.211.205 251.21.163.13 211.2.17.109
249.114.138.241 137.133.71.91 62.229.119.218 46.232.148.2