Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Watsonville

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.16.59.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.16.59.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:15:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
168.59.16.134.in-addr.arpa domain name pointer syn-134-016-059-168.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.59.16.134.in-addr.arpa	name = syn-134-016-059-168.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.49.113.49 attack
2019-03-08 17:39:22 1h2IWo-0000mb-4W SMTP connection from \(host-197.49.113.49.tedata.net\) \[197.49.113.49\]:14013 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 17:39:53 1h2IXI-0000n9-N2 SMTP connection from \(host-197.49.113.49.tedata.net\) \[197.49.113.49\]:14210 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 17:40:05 1h2IXU-0000pE-N7 SMTP connection from \(host-197.49.113.49.tedata.net\) \[197.49.113.49\]:14330 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 03:34:20
199.189.27.101 attackbotsspam
2019-03-08 21:29:18 1h2M7K-00075i-KO SMTP connection from sizzle.hasanhost.com \(sizzle.apetechpanthiya.icu\) \[199.189.27.101\]:49333 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 21:30:03 1h2M83-00078O-ML SMTP connection from sizzle.hasanhost.com \(sizzle.apetechpanthiya.icu\) \[199.189.27.101\]:40616 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 21:31:49 1h2M9l-0007AU-DW SMTP connection from sizzle.hasanhost.com \(sizzle.apetechpanthiya.icu\) \[199.189.27.101\]:38133 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-03-12 23:17:01 1h3phl-0001xh-11 SMTP connection from sizzle.hasanhost.com \(sizzle.arzeshcompany.icu\) \[199.189.27.101\]:44086 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-12 23:20:02 1h3pkg-00024J-70 SMTP connection from sizzle.hasanhost.com \(sizzle.arzeshcompany.icu\) \[199.189.27.101\]:46236 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-12 23:20:36 1h3plE-00025F-6j SMTP connection from sizzle.hasanhost.com \(sizzle.arzeshcompan
...
2020-01-30 03:03:13
5.62.49.32 attackbotsspam
Unauthorized connection attempt from IP address 5.62.49.32 on Port 445(SMB)
2020-01-30 03:12:41
45.172.212.203 attack
Unauthorized connection attempt detected from IP address 45.172.212.203 to port 23 [J]
2020-01-30 03:33:15
175.195.254.99 attackbots
Jan 29 19:20:13 vmd17057 sshd\[11540\]: Invalid user haramala from 175.195.254.99 port 49026
Jan 29 19:20:13 vmd17057 sshd\[11540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.195.254.99
Jan 29 19:20:15 vmd17057 sshd\[11540\]: Failed password for invalid user haramala from 175.195.254.99 port 49026 ssh2
...
2020-01-30 03:16:11
218.92.0.189 attack
Jan 29 19:37:53 legacy sshd[4029]: Failed password for root from 218.92.0.189 port 11630 ssh2
Jan 29 19:38:53 legacy sshd[4047]: Failed password for root from 218.92.0.189 port 28436 ssh2
...
2020-01-30 03:02:42
85.96.191.37 attack
Unauthorized connection attempt from IP address 85.96.191.37 on Port 445(SMB)
2020-01-30 03:18:18
104.129.42.223 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-30 03:10:28
197.31.74.185 attackbotsspam
2019-03-08 15:53:19 1h2GsB-0005vf-8M SMTP connection from \(\[197.31.74.185\]\) \[197.31.74.185\]:27282 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 15:54:00 1h2Gsq-0005wV-7b SMTP connection from \(\[197.31.74.185\]\) \[197.31.74.185\]:27549 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 15:54:27 1h2GtH-0005xA-G2 SMTP connection from \(\[197.31.74.185\]\) \[197.31.74.185\]:27757 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 03:36:19
200.194.28.116 attack
Jan 29 19:53:24 sd-53420 sshd\[12811\]: User root from 200.194.28.116 not allowed because none of user's groups are listed in AllowGroups
Jan 29 19:53:24 sd-53420 sshd\[12811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.194.28.116  user=root
Jan 29 19:53:27 sd-53420 sshd\[12811\]: Failed password for invalid user root from 200.194.28.116 port 42574 ssh2
Jan 29 19:53:29 sd-53420 sshd\[12811\]: Failed password for invalid user root from 200.194.28.116 port 42574 ssh2
Jan 29 19:53:31 sd-53420 sshd\[12811\]: Failed password for invalid user root from 200.194.28.116 port 42574 ssh2
...
2020-01-30 03:28:14
81.22.45.85 attackbots
01/29/2020-13:46:48.309187 81.22.45.85 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-30 03:10:59
66.85.170.174 attackspam
1433/tcp
[2020-01-29]1pkt
2020-01-30 03:01:13
103.85.88.115 attackbotsspam
" "
2020-01-30 03:31:25
107.189.11.193 attack
Unauthorized connection attempt detected from IP address 107.189.11.193 to port 22 [J]
2020-01-30 03:35:45
119.110.83.60 attack
Unauthorized connection attempt from IP address 119.110.83.60 on Port 445(SMB)
2020-01-30 03:38:07

Recently Reported IPs

12.124.251.143 251.35.234.249 9.86.233.68 87.63.38.20
31.227.128.50 205.201.159.145 39.235.92.68 208.2.176.210
48.248.197.202 227.229.198.157 49.83.85.36 230.22.221.21
92.103.122.24 147.16.228.36 17.189.64.176 147.203.62.40
121.193.65.48 148.130.117.165 52.170.198.251 191.135.110.221