Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bochum

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Ruhr-Universitaet Bochum

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.147.234.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59618
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.147.234.54.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 01 23:49:23 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 54.234.147.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 54.234.147.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.22.230.226 attack
Sep  4 18:16:56 bilbo sshd[29533]: User root from 165.22.230.226 not allowed because not listed in AllowUsers
Sep  4 18:17:12 bilbo sshd[29581]: User root from 165.22.230.226 not allowed because not listed in AllowUsers
Sep  4 18:17:29 bilbo sshd[29584]: User root from 165.22.230.226 not allowed because not listed in AllowUsers
Sep  4 18:17:45 bilbo sshd[29586]: Invalid user admin from 165.22.230.226
...
2020-09-05 06:21:53
163.172.143.1 attackspambots
Failed password for invalid user from 163.172.143.1 port 37104 ssh2
2020-09-05 06:40:47
210.9.47.154 attackspambots
2020-09-04T13:33:58.6586111495-001 sshd[60163]: Failed password for root from 210.9.47.154 port 40042 ssh2
2020-09-04T13:36:32.7309181495-001 sshd[60311]: Invalid user pm from 210.9.47.154 port 46792
2020-09-04T13:36:32.7340751495-001 sshd[60311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.9.47.154
2020-09-04T13:36:32.7309181495-001 sshd[60311]: Invalid user pm from 210.9.47.154 port 46792
2020-09-04T13:36:34.8140451495-001 sshd[60311]: Failed password for invalid user pm from 210.9.47.154 port 46792 ssh2
2020-09-04T13:39:09.3257561495-001 sshd[60467]: Invalid user cadence from 210.9.47.154 port 53540
...
2020-09-05 06:26:21
91.134.142.57 attackspambots
91.134.142.57 - - [04/Sep/2020:17:00:23 +0000] "POST /wp-login.php HTTP/1.1" 200 2077 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
91.134.142.57 - - [04/Sep/2020:17:00:25 +0000] "POST /wp-login.php HTTP/1.1" 200 2076 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
91.134.142.57 - - [04/Sep/2020:17:00:27 +0000] "POST /wp-login.php HTTP/1.1" 200 2070 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
91.134.142.57 - - [04/Sep/2020:17:00:29 +0000] "POST /wp-login.php HTTP/1.1" 200 2072 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
91.134.142.57 - - [04/Sep/2020:17:00:30 +0000] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
2020-09-05 06:36:51
180.76.107.10 attackspambots
Sep  4 23:41:26 minden010 sshd[19800]: Failed password for root from 180.76.107.10 port 47458 ssh2
Sep  4 23:44:01 minden010 sshd[20610]: Failed password for root from 180.76.107.10 port 56438 ssh2
Sep  4 23:46:35 minden010 sshd[21573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.107.10
...
2020-09-05 06:08:07
208.83.85.55 attackspambots
20/9/4@12:51:22: FAIL: IoT-Telnet address from=208.83.85.55
...
2020-09-05 06:39:15
201.43.35.60 attackbotsspam
SSH Invalid Login
2020-09-05 06:39:02
193.70.81.132 attack
193.70.81.132 - - [04/Sep/2020:18:52:11 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
193.70.81.132 - - [04/Sep/2020:18:52:11 +0200] "POST /wp-login.php HTTP/1.1" 200 2698 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
193.70.81.132 - - [04/Sep/2020:18:52:11 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
193.70.81.132 - - [04/Sep/2020:18:52:11 +0200] "POST /wp-login.php HTTP/1.1" 200 2697 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
193.70.81.132 - - [04/Sep/2020:18:52:11 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
193.70.81.132 - - [04/Sep/2020:18:52:11 +0200] "POST /wp-login.php HTTP/1.1" 200 2696 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir
...
2020-09-05 06:03:11
189.229.94.38 attack
Honeypot attack, port: 445, PTR: dsl-189-229-94-38-dyn.prod-infinitum.com.mx.
2020-09-05 06:14:09
107.189.11.78 attackbotsspam
2020-09-04T14:03:15.608974morrigan.ad5gb.com sshd[736319]: Failed password for root from 107.189.11.78 port 58448 ssh2
2020-09-04T14:03:21.434898morrigan.ad5gb.com sshd[736319]: Failed password for root from 107.189.11.78 port 58448 ssh2
2020-09-05 06:17:08
62.173.145.222 attack
[2020-09-04 14:34:02] NOTICE[1194][C-000006ca] chan_sip.c: Call from '' (62.173.145.222:51117) to extension '01114234273128' rejected because extension not found in context 'public'.
[2020-09-04 14:34:02] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-04T14:34:02.363-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01114234273128",SessionID="0x7f2ddc0bf9a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.173.145.222/51117",ACLName="no_extension_match"
[2020-09-04 14:35:53] NOTICE[1194][C-000006cd] chan_sip.c: Call from '' (62.173.145.222:64662) to extension '901114234273128' rejected because extension not found in context 'public'.
[2020-09-04 14:35:53] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-04T14:35:53.814-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901114234273128",SessionID="0x7f2ddc0e4da8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
...
2020-09-05 06:29:09
47.52.112.219 attackspam
3-9-2020 18:45:55	Unauthorized connection attempt (Brute-Force).
3-9-2020 18:45:55	Connection from IP address: 47.52.112.219 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=47.52.112.219
2020-09-05 06:29:40
167.99.86.148 attackspambots
2020-09-04T22:29:25.879208lavrinenko.info sshd[5483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.86.148  user=root
2020-09-04T22:29:28.108713lavrinenko.info sshd[5483]: Failed password for root from 167.99.86.148 port 37400 ssh2
2020-09-04T22:31:21.159940lavrinenko.info sshd[5506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.86.148  user=root
2020-09-04T22:31:23.314181lavrinenko.info sshd[5506]: Failed password for root from 167.99.86.148 port 55804 ssh2
2020-09-04T22:33:05.287452lavrinenko.info sshd[5550]: Invalid user zkb from 167.99.86.148 port 45978
...
2020-09-05 06:39:51
179.56.28.64 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 06:35:23
196.52.43.127 attack
Scan or attack attempt on email service.
2020-09-05 06:23:12

Recently Reported IPs

103.81.63.18 117.60.137.51 199.88.141.197 168.228.150.68
72.254.213.64 206.33.168.230 191.90.7.41 69.44.177.34
142.39.138.158 123.232.124.106 37.96.59.156 185.228.229.217
165.244.197.47 220.174.20.120 41.8.48.91 34.71.50.4
168.232.131.80 178.132.220.199 62.236.246.40 197.231.203.33