Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Braunschweig

Region: Lower Saxony

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.169.148.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.169.148.18.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012900 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 29 13:51:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
18.148.169.134.in-addr.arpa domain name pointer aligphone.ifl.ing.tu-bs.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.148.169.134.in-addr.arpa	name = aligphone.ifl.ing.tu-bs.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.117.46.125 attackbotsspam
badbot
2019-11-20 21:49:08
185.176.27.18 attackspambots
Port-scan: detected 102 distinct ports within a 24-hour window.
2019-11-20 21:38:44
222.124.162.170 attackbots
11/20/2019-07:20:43.010853 222.124.162.170 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-20 21:28:24
114.107.151.81 attackbotsspam
badbot
2019-11-20 21:16:05
151.80.254.74 attackspam
Nov 20 18:13:22 gw1 sshd[8402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.74
Nov 20 18:13:24 gw1 sshd[8402]: Failed password for invalid user acc from 151.80.254.74 port 47734 ssh2
...
2019-11-20 21:17:52
95.178.216.15 attack
Telnetd brute force attack detected by fail2ban
2019-11-20 21:16:21
180.168.70.190 attack
Triggered by Fail2Ban at Ares web server
2019-11-20 21:15:10
222.69.141.116 attack
firewall-block, port(s): 1433/tcp
2019-11-20 21:42:12
112.85.42.173 attackspam
Nov 20 01:50:45 linuxvps sshd\[965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Nov 20 01:50:47 linuxvps sshd\[965\]: Failed password for root from 112.85.42.173 port 61352 ssh2
Nov 20 01:51:01 linuxvps sshd\[965\]: Failed password for root from 112.85.42.173 port 61352 ssh2
Nov 20 01:51:05 linuxvps sshd\[1162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Nov 20 01:51:08 linuxvps sshd\[1162\]: Failed password for root from 112.85.42.173 port 18295 ssh2
2019-11-20 21:08:56
68.183.233.171 attackspambots
Nov 20 09:23:42 MK-Soft-VM5 sshd[17532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.233.171 
Nov 20 09:23:44 MK-Soft-VM5 sshd[17532]: Failed password for invalid user rooooooot from 68.183.233.171 port 46708 ssh2
...
2019-11-20 21:40:11
35.159.42.139 attackbotsspam
Nov 20 08:22:16 root sshd[31092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.159.42.139 
Nov 20 08:22:18 root sshd[31092]: Failed password for invalid user shaylie from 35.159.42.139 port 59184 ssh2
Nov 20 08:25:26 root sshd[31110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.159.42.139 
...
2019-11-20 21:27:45
159.203.201.6 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-20 21:34:19
198.108.67.95 attackspambots
11/20/2019-07:25:23.100006 198.108.67.95 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-20 21:12:23
220.165.154.125 attackspambots
badbot
2019-11-20 21:23:02
223.247.168.231 attackspambots
badbot
2019-11-20 21:39:03

Recently Reported IPs

171.229.233.210 43.180.9.80 85.165.93.92 242.72.26.180
19.20.171.252 205.144.171.80 224.162.238.102 10.157.213.72
140.85.130.41 162.158.126.66 18.112.179.106 103.73.206.31
16.32.246.254 37.60.131.83 164.45.132.141 56.61.234.214
77.242.207.114 64.12.215.122 111.234.90.187 51.242.205.115