Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.152.80.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.152.80.201.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110300 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 04 00:36:57 CST 2019
;; MSG SIZE  rcvd: 118
Host info
201.80.152.134.in-addr.arpa domain name pointer host-134-152-80-201.pnt-blkhst.osd.mil.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.80.152.134.in-addr.arpa	name = host-134-152-80-201.pnt-blkhst.osd.mil.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
122.114.199.199 attackspambots
Sep 10 05:09:44 vbuntu sshd[20086]: refused connect from 122.114.199.199 (122.114.199.199)
Sep 10 05:09:50 vbuntu sshd[20087]: refused connect from 122.114.199.199 (122.114.199.199)
Sep 10 05:09:50 vbuntu sshd[20088]: refused connect from 122.114.199.199 (122.114.199.199)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.114.199.199
2019-11-07 06:49:33
201.217.51.9 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-11-07 06:12:47
27.66.241.31 attackspambots
Unauthorized connection attempt from IP address 27.66.241.31 on Port 445(SMB)
2019-11-07 06:29:22
5.196.201.7 attackbotsspam
Nov  6 23:23:55 mail postfix/smtpd[11034]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  6 23:24:49 mail postfix/smtpd[11417]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  6 23:24:54 mail postfix/smtpd[11414]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07 06:36:37
46.105.122.62 attackspam
Nov  6 18:42:04 server sshd\[7339\]: Failed password for invalid user www from 46.105.122.62 port 42682 ssh2
Nov  7 01:35:52 server sshd\[16427\]: Invalid user zimbra from 46.105.122.62
Nov  7 01:35:52 server sshd\[16427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3045583.ip-46-105-122.eu 
Nov  7 01:35:54 server sshd\[16427\]: Failed password for invalid user zimbra from 46.105.122.62 port 39796 ssh2
Nov  7 01:45:15 server sshd\[18948\]: Invalid user jason from 46.105.122.62
Nov  7 01:45:15 server sshd\[18948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3045583.ip-46-105-122.eu 
...
2019-11-07 06:50:34
39.42.118.83 attackbots
Unauthorized connection attempt from IP address 39.42.118.83 on Port 445(SMB)
2019-11-07 06:12:24
13.67.183.43 attackbots
[munged]::443 13.67.183.43 - - [06/Nov/2019:22:12:16 +0100] "POST /[munged]: HTTP/1.1" 200 6208 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 13.67.183.43 - - [06/Nov/2019:22:12:18 +0100] "POST /[munged]: HTTP/1.1" 200 6179 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 13.67.183.43 - - [06/Nov/2019:22:12:18 +0100] "POST /[munged]: HTTP/1.1" 200 6179 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-07 06:15:49
160.120.167.251 attackbots
[Aegis] @ 2019-11-06 14:30:45  0000 -> SSH insecure connection attempt (scan).
2019-11-07 06:34:02
49.81.203.191 attack
Brute force SMTP login attempts.
2019-11-07 06:50:02
103.106.28.230 attackbotsspam
Chat Spam
2019-11-07 06:10:16
118.217.9.103 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/118.217.9.103/ 
 
 KR - 1H : (137)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN9318 
 
 IP : 118.217.9.103 
 
 CIDR : 118.217.0.0/20 
 
 PREFIX COUNT : 2487 
 
 UNIQUE IP COUNT : 14360064 
 
 
 ATTACKS DETECTED ASN9318 :  
  1H - 3 
  3H - 7 
  6H - 17 
 12H - 33 
 24H - 51 
 
 DateTime : 2019-11-06 23:46:13 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 06:56:04
77.247.110.144 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-11-07 06:14:49
180.101.227.173 attackspambots
sshd jail - ssh hack attempt
2019-11-07 06:31:19
112.91.149.134 attackbots
Nov  6 23:15:33 SilenceServices sshd[11591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.91.149.134
Nov  6 23:15:35 SilenceServices sshd[11591]: Failed password for invalid user 89532E 11 from 112.91.149.134 port 36626 ssh2
Nov  6 23:19:39 SilenceServices sshd[15246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.91.149.134
2019-11-07 06:32:00
158.248.181.118 attackspambots
Unauthorized connection attempt from IP address 158.248.181.118 on Port 445(SMB)
2019-11-07 06:28:57

Recently Reported IPs

203.27.152.58 57.126.240.170 52.143.88.207 216.251.214.85
182.50.151.69 33.81.168.174 118.57.32.196 123.22.110.72
171.125.73.252 196.7.231.159 130.146.72.222 20.65.93.145
80.196.135.200 94.150.52.126 62.139.38.23 191.131.205.226
132.239.139.56 98.145.251.18 106.31.80.223 202.231.167.222