Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Braunschweig

Region: Niedersachsen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.169.162.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18338
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.169.162.216.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:53:37 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 216.162.169.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.162.169.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.72.10.9 attackbots
Email Subject: 'Look in my eyes. You can see everything there. I'm a woman who can feel.'
2019-10-26 06:09:41
80.82.65.74 attackbotsspam
Excessive Port-Scanning
2019-10-26 06:18:10
14.63.212.215 attack
Oct 25 23:27:31 MK-Soft-Root2 sshd[2921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.212.215 
Oct 25 23:27:32 MK-Soft-Root2 sshd[2921]: Failed password for invalid user spen from 14.63.212.215 port 50222 ssh2
...
2019-10-26 05:56:08
46.101.27.6 attackspam
Invalid user postgres from 46.101.27.6 port 41806
2019-10-26 06:24:56
179.95.243.61 attackspam
Automatic report - Port Scan Attack
2019-10-26 06:17:26
81.12.159.146 attackspambots
Oct 26 03:01:35 gw1 sshd[7039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.159.146
Oct 26 03:01:37 gw1 sshd[7039]: Failed password for invalid user oracle from 81.12.159.146 port 45982 ssh2
...
2019-10-26 06:21:10
111.62.28.58 attack
Portscan or hack attempt detected by psad/fwsnort
2019-10-26 06:31:06
58.22.99.135 attackbots
Triggered by Fail2Ban at Vostok web server
2019-10-26 05:57:16
169.239.220.35 attackbotsspam
Oct 25 20:18:22 flomail dovecot: imap-login: Disconnected (auth failed, 1 attempts in 4 secs): user=, method=PLAIN, rip=169.239.220.35, lip=10.140.194.78, TLS: Disconnected, session=
Oct 25 20:19:33 flomail dovecot: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=169.239.220.35, lip=10.140.194.78, TLS, session=
Oct 25 20:27:03 flomail dovecot: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=169.239.220.35, lip=10.140.194.78, TLS: Disconnected, session=
2019-10-26 06:13:02
192.144.174.51 attackbotsspam
Invalid user sa from 192.144.174.51 port 57768
2019-10-26 06:30:39
23.129.64.190 attackbotsspam
Automatic report - Banned IP Access
2019-10-26 06:23:23
112.85.42.195 attackspambots
Oct 25 23:54:17 ArkNodeAT sshd\[22544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
Oct 25 23:54:18 ArkNodeAT sshd\[22544\]: Failed password for root from 112.85.42.195 port 47002 ssh2
Oct 25 23:55:15 ArkNodeAT sshd\[22953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
2019-10-26 06:05:14
202.120.38.28 attackspam
Oct 25 12:09:21 wbs sshd\[11751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28  user=root
Oct 25 12:09:23 wbs sshd\[11751\]: Failed password for root from 202.120.38.28 port 24514 ssh2
Oct 25 12:14:01 wbs sshd\[12129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28  user=root
Oct 25 12:14:03 wbs sshd\[12129\]: Failed password for root from 202.120.38.28 port 33281 ssh2
Oct 25 12:18:42 wbs sshd\[12485\]: Invalid user michael from 202.120.38.28
Oct 25 12:18:42 wbs sshd\[12485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28
2019-10-26 06:28:20
117.232.127.50 attackbots
Invalid user applmgr from 117.232.127.50 port 53464
2019-10-26 06:04:31
46.246.70.45 attackspambots
2019-10-25 dovecot_login authenticator failed for \(USER\) \[46.246.70.45\]: 535 Incorrect authentication data \(set_id=spam@**REMOVED**.de\)
2019-10-25 dovecot_login authenticator failed for \(USER\) \[46.246.70.45\]: 535 Incorrect authentication data \(set_id=spam@**REMOVED**.eu\)
2019-10-25 dovecot_login authenticator failed for \(USER\) \[46.246.70.45\]: 535 Incorrect authentication data \(set_id=spam@**REMOVED**.de\)
2019-10-26 06:12:16

Recently Reported IPs

130.203.202.127 240.135.29.218 249.32.87.223 121.233.195.218
45.125.0.127 150.141.125.153 104.240.153.213 10.14.95.185
253.79.102.225 74.113.237.199 98.228.21.225 133.62.128.129
30.50.174.42 192.51.122.83 172.255.45.30 186.39.162.212
192.126.154.54 243.231.144.235 141.172.222.199 113.56.252.126