Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.166.136.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.166.136.104.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 09:21:06 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 104.136.166.134.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 134.166.136.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.230.53.57 attackbots
TCP ports : 9167 / 28640
2020-08-15 18:29:26
172.105.89.161 attackbotsspam
 TCP (SYN) 172.105.89.161:57340 -> port 443, len 40
2020-08-15 18:45:30
213.33.226.118 attackspam
Aug 15 05:41:18 root sshd[12836]: Failed password for root from 213.33.226.118 port 41496 ssh2
Aug 15 05:55:41 root sshd[14602]: Failed password for root from 213.33.226.118 port 54022 ssh2
...
2020-08-15 18:41:46
218.92.0.168 attack
[MK-VM2] SSH login failed
2020-08-15 18:29:59
119.161.98.141 attackspambots
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(08151055)
2020-08-15 18:27:16
114.107.145.86 attackspam
Email rejected due to spam filtering
2020-08-15 18:11:25
75.31.93.181 attackbotsspam
frenzy
2020-08-15 18:48:10
58.33.49.196 attack
" "
2020-08-15 18:36:24
138.121.114.14 attack
firewall-block, port(s): 445/tcp
2020-08-15 18:41:04
106.13.171.12 attackspambots
frenzy
2020-08-15 18:30:13
85.209.0.131 attackspambots
 TCP (SYN) 85.209.0.131:24444 -> port 22, len 60
2020-08-15 18:21:12
198.20.103.244 attackbotsspam
firewall-block, port(s): 53/tcp
2020-08-15 18:35:41
188.120.235.117 attack
CMS (WordPress or Joomla) login attempt.
2020-08-15 18:18:05
193.112.70.95 attackspambots
frenzy
2020-08-15 18:51:22
109.87.143.67 attackspambots
Dovecot Invalid User Login Attempt.
2020-08-15 18:18:59

Recently Reported IPs

195.147.23.151 118.103.102.77 4.207.78.30 122.157.10.230
145.188.201.209 142.196.79.237 199.235.7.194 186.139.78.204
103.32.56.35 117.68.53.1 216.100.83.4 141.128.207.249
212.153.194.101 208.168.18.144 43.215.16.169 241.244.23.44
180.156.115.10 120.48.209.47 189.134.3.160 140.83.96.124