Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.140.145.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21581
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.140.145.189.		IN	A

;; AUTHORITY SECTION:
.			100	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 00:28:21 CST 2022
;; MSG SIZE  rcvd: 108
Host info
189.145.140.134.in-addr.arpa domain name pointer dhcp-145-189.science-wlan-b.simmons.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.145.140.134.in-addr.arpa	name = dhcp-145-189.science-wlan-b.simmons.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
219.79.132.59 attackbotsspam
unauthorized connection attempt
2020-01-12 15:35:19
5.69.240.82 attackspam
Unauthorized connection attempt detected from IP address 5.69.240.82 to port 23 [J]
2020-01-12 15:42:51
175.166.98.91 attackspambots
unauthorized connection attempt
2020-01-12 15:10:37
195.181.115.113 attackspambots
unauthorized connection attempt
2020-01-12 15:29:47
2.182.21.56 attackbotsspam
unauthorized connection attempt
2020-01-12 15:39:26
49.149.140.91 attack
20/1/11@23:56:23: FAIL: Alarm-Network address from=49.149.140.91
...
2020-01-12 15:22:32
61.94.213.78 attack
1578804987 - 01/12/2020 05:56:27 Host: 61.94.213.78/61.94.213.78 Port: 445 TCP Blocked
2020-01-12 15:08:44
203.146.129.235 attackbots
Port 1433 Scan
2020-01-12 15:19:27
203.191.149.141 attack
Unauthorized connection attempt detected from IP address 203.191.149.141 to port 1433 [J]
2020-01-12 15:29:03
119.177.40.56 attackspam
unauthorized connection attempt
2020-01-12 15:27:35
197.51.139.171 attack
unauthorized connection attempt
2020-01-12 15:23:01
41.38.46.50 attackbots
unauthorized connection attempt
2020-01-12 15:37:59
122.84.233.68 attackbotsspam
unauthorized connection attempt
2020-01-12 15:12:09
157.245.202.221 attackspambots
Unauthorized connection attempt detected from IP address 157.245.202.221 to port 8545 [J]
2020-01-12 15:44:49
222.186.42.4 attackbots
Jan 12 08:14:02 vmd26974 sshd[28585]: Failed password for root from 222.186.42.4 port 25572 ssh2
Jan 12 08:14:21 vmd26974 sshd[28585]: error: maximum authentication attempts exceeded for root from 222.186.42.4 port 25572 ssh2 [preauth]
...
2020-01-12 15:19:03

Recently Reported IPs

65.110.150.105 9.202.145.4 112.32.44.86 130.127.126.212
73.150.244.58 235.91.255.191 245.8.123.123 44.72.26.5
149.244.60.108 115.79.0.25 116.205.29.100 60.109.211.2
59.95.19.17 253.140.220.26 70.27.241.186 12.54.53.212
93.26.233.89 75.130.169.6 246.213.225.91 235.28.128.248