Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.159.189.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.159.189.100.		IN	A

;; AUTHORITY SECTION:
.			506	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010600 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 23:44:29 CST 2022
;; MSG SIZE  rcvd: 108
Host info
100.189.159.134.in-addr.arpa domain name pointer unknown.telstraglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.189.159.134.in-addr.arpa	name = unknown.telstraglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.241.46.214 attackbots
Jun 30 03:47:45 scw-focused-cartwright sshd[13501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.241.46.214
Jun 30 03:47:46 scw-focused-cartwright sshd[13501]: Failed password for invalid user supervisor from 180.241.46.214 port 12321 ssh2
2020-06-30 20:21:15
180.76.144.99 attack
unauthorized connection attempt
2020-06-30 19:54:58
197.214.67.241 attackbotsspam
SSH Brute-Force Attack
2020-06-30 20:13:13
101.236.60.31 attack
Jun 30 06:28:12 lnxmysql61 sshd[28739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.236.60.31
2020-06-30 20:02:12
182.43.136.178 attack
Invalid user ohm from 182.43.136.178 port 35416
2020-06-30 20:23:23
115.186.149.166 attackbots
SMB Server BruteForce Attack
2020-06-30 20:35:25
31.206.69.66 attackbotsspam
$f2bV_matches
2020-06-30 20:32:01
61.167.78.116 attack
Automatic report - Banned IP Access
2020-06-30 19:57:31
14.29.56.246 attackspam
Jun 30 14:25:07 santamaria sshd\[12077\]: Invalid user lky from 14.29.56.246
Jun 30 14:25:07 santamaria sshd\[12077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.56.246
Jun 30 14:25:09 santamaria sshd\[12077\]: Failed password for invalid user lky from 14.29.56.246 port 42784 ssh2
...
2020-06-30 20:42:05
189.238.61.106 attackbotsspam
1593488877 - 06/30/2020 05:47:57 Host: 189.238.61.106/189.238.61.106 Port: 445 TCP Blocked
2020-06-30 20:09:47
79.124.62.118 attackspambots
2020-06-29 11:32:59 SMTP:25 IP autobanned - 1 attempts  a day
2020-06-30 20:06:08
186.233.231.230 attack
port 23
2020-06-30 20:01:42
52.188.150.173 attackspam
(smtpauth) Failed SMTP AUTH login from 52.188.150.173 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-30 08:17:48 login authenticator failed for (ADMIN) [52.188.150.173]: 535 Incorrect authentication data (set_id=itmanager@iwnt.com)
2020-06-30 20:17:38
118.24.140.69 attackbots
Jun 30 00:29:01 ny01 sshd[29656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.69
Jun 30 00:29:04 ny01 sshd[29656]: Failed password for invalid user o from 118.24.140.69 port 30971 ssh2
Jun 30 00:31:48 ny01 sshd[30008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.69
2020-06-30 20:08:11
68.183.227.196 attackspambots
Jun 30 13:22:05 gestao sshd[30536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.196 
Jun 30 13:22:07 gestao sshd[30536]: Failed password for invalid user hoang from 68.183.227.196 port 40708 ssh2
Jun 30 13:25:17 gestao sshd[30605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.196 
...
2020-06-30 20:31:37

Recently Reported IPs

94.80.7.93 8.186.168.167 41.17.239.68 84.19.154.186
87.121.105.108 224.34.98.39 79.0.134.192 94.123.108.239
239.104.56.240 223.23.3.26 76.121.14.138 159.244.232.14
201.208.139.115 58.31.43.230 206.110.199.1 9.142.172.61
252.13.250.252 121.170.101.215 117.111.191.165 156.123.181.49