Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.146.200.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.146.200.137.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:42:35 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 137.200.146.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.200.146.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.209.24.1 attack
SSH login attempts with user root.
2019-11-19 01:58:41
103.109.111.2 attackspam
web Attack on Website
2019-11-19 01:42:15
162.144.112.131 attackbots
Automatic report - XMLRPC Attack
2019-11-19 01:56:01
170.130.187.2 attackspambots
170.130.187.2 was recorded 5 times by 5 hosts attempting to connect to the following ports: 1433,23,21. Incident counter (4h, 24h, all-time): 5, 8, 94
2019-11-19 01:45:19
1.55.17.162 attack
Nov 11 21:25:47 woltan sshd[4349]: Failed password for invalid user swantner from 1.55.17.162 port 32812 ssh2
2019-11-19 02:10:21
118.25.133.121 attack
Automatic report - Banned IP Access
2019-11-19 02:11:25
222.142.248.193 attack
Unauthorised access (Nov 18) SRC=222.142.248.193 LEN=40 TTL=50 ID=49266 TCP DPT=23 WINDOW=54075 SYN
2019-11-19 02:16:17
167.99.159.3 attackspam
SSH login attempts with user root.
2019-11-19 02:02:09
171.38.192.16 attackspambots
port 23 attempt blocked
2019-11-19 02:07:21
222.186.180.223 attackspambots
Nov 18 18:45:37 sd-53420 sshd\[27785\]: User root from 222.186.180.223 not allowed because none of user's groups are listed in AllowGroups
Nov 18 18:45:37 sd-53420 sshd\[27785\]: Failed none for invalid user root from 222.186.180.223 port 22218 ssh2
Nov 18 18:45:38 sd-53420 sshd\[27785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Nov 18 18:45:39 sd-53420 sshd\[27785\]: Failed password for invalid user root from 222.186.180.223 port 22218 ssh2
Nov 18 18:45:42 sd-53420 sshd\[27785\]: Failed password for invalid user root from 222.186.180.223 port 22218 ssh2
...
2019-11-19 01:52:11
101.230.236.177 attackspambots
Nov 17 00:05:55 woltan sshd[9587]: Failed password for root from 101.230.236.177 port 54592 ssh2
2019-11-19 02:14:09
77.247.109.3 attackbots
web Attack on Website
2019-11-19 01:43:13
178.128.191.4 attack
SSH login attempts with user root.
2019-11-19 02:00:11
157.245.104.64 attackspambots
xmlrpc attack
2019-11-19 01:39:42
123.9.108.127 attackspam
port scan and connect, tcp 23 (telnet)
2019-11-19 01:47:29

Recently Reported IPs

21.186.152.209 199.246.229.34 29.98.129.197 26.121.198.182
109.242.207.17 176.103.203.253 92.118.211.5 120.87.76.23
157.198.11.17 101.237.42.88 174.6.178.3 250.123.25.150
170.211.26.97 26.183.107.84 252.123.126.141 216.99.34.69
46.75.75.182 86.178.127.30 62.103.126.132 186.218.248.153