Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Braunschweig

Region: Niedersachsen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.169.238.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16831
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.169.238.20.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100701 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 08 05:38:18 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 20.238.169.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.238.169.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.101.204.20 attackspambots
Aug 28 07:13:10 pkdns2 sshd\[8143\]: Failed password for root from 46.101.204.20 port 35902 ssh2Aug 28 07:15:04 pkdns2 sshd\[8263\]: Invalid user stuart from 46.101.204.20Aug 28 07:15:06 pkdns2 sshd\[8263\]: Failed password for invalid user stuart from 46.101.204.20 port 39346 ssh2Aug 28 07:17:02 pkdns2 sshd\[8328\]: Failed password for mysql from 46.101.204.20 port 42786 ssh2Aug 28 07:18:51 pkdns2 sshd\[8397\]: Failed password for root from 46.101.204.20 port 46226 ssh2Aug 28 07:20:45 pkdns2 sshd\[8504\]: Failed password for root from 46.101.204.20 port 49670 ssh2
...
2020-08-28 12:21:37
111.21.99.227 attackspambots
Aug 28 05:46:46 ns392434 sshd[7862]: Invalid user admin from 111.21.99.227 port 41462
Aug 28 05:46:46 ns392434 sshd[7862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227
Aug 28 05:46:46 ns392434 sshd[7862]: Invalid user admin from 111.21.99.227 port 41462
Aug 28 05:46:48 ns392434 sshd[7862]: Failed password for invalid user admin from 111.21.99.227 port 41462 ssh2
Aug 28 05:52:47 ns392434 sshd[7998]: Invalid user test from 111.21.99.227 port 45440
Aug 28 05:52:47 ns392434 sshd[7998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227
Aug 28 05:52:47 ns392434 sshd[7998]: Invalid user test from 111.21.99.227 port 45440
Aug 28 05:52:49 ns392434 sshd[7998]: Failed password for invalid user test from 111.21.99.227 port 45440 ssh2
Aug 28 05:56:36 ns392434 sshd[8064]: Invalid user lee from 111.21.99.227 port 58848
2020-08-28 12:16:01
206.189.132.204 attack
(sshd) Failed SSH login from 206.189.132.204 (IN/India/-): 5 in the last 3600 secs
2020-08-28 12:16:25
212.252.106.196 attack
Aug 28 05:48:07 h1745522 sshd[17264]: Invalid user m1 from 212.252.106.196 port 52398
Aug 28 05:48:07 h1745522 sshd[17264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.252.106.196
Aug 28 05:48:07 h1745522 sshd[17264]: Invalid user m1 from 212.252.106.196 port 52398
Aug 28 05:48:10 h1745522 sshd[17264]: Failed password for invalid user m1 from 212.252.106.196 port 52398 ssh2
Aug 28 05:52:18 h1745522 sshd[17912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.252.106.196  user=mysql
Aug 28 05:52:20 h1745522 sshd[17912]: Failed password for mysql from 212.252.106.196 port 56976 ssh2
Aug 28 05:56:36 h1745522 sshd[18617]: Invalid user administracion from 212.252.106.196 port 33326
Aug 28 05:56:36 h1745522 sshd[18617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.252.106.196
Aug 28 05:56:36 h1745522 sshd[18617]: Invalid user administracion from 212.252.1
...
2020-08-28 12:12:50
42.113.190.241 attack
20/8/27@23:56:49: FAIL: Alarm-Network address from=42.113.190.241
20/8/27@23:56:50: FAIL: Alarm-Network address from=42.113.190.241
...
2020-08-28 12:06:21
196.3.171.138 attackbots
Dovecot Invalid User Login Attempt.
2020-08-28 12:29:33
129.28.183.62 attackspambots
Aug 27 23:55:40 NPSTNNYC01T sshd[4936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.183.62
Aug 27 23:55:42 NPSTNNYC01T sshd[4936]: Failed password for invalid user bryan from 129.28.183.62 port 54814 ssh2
Aug 27 23:56:54 NPSTNNYC01T sshd[5034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.183.62
...
2020-08-28 12:01:38
187.217.199.20 attackbotsspam
Aug 28 13:59:45 localhost sshd[2562931]: Invalid user abhijit from 187.217.199.20 port 48712
...
2020-08-28 12:21:57
111.229.79.17 attackbots
Aug 28 05:33:32 ns382633 sshd\[22745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.79.17  user=root
Aug 28 05:33:34 ns382633 sshd\[22745\]: Failed password for root from 111.229.79.17 port 38444 ssh2
Aug 28 05:56:38 ns382633 sshd\[27010\]: Invalid user hayden from 111.229.79.17 port 32924
Aug 28 05:56:38 ns382633 sshd\[27010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.79.17
Aug 28 05:56:40 ns382633 sshd\[27010\]: Failed password for invalid user hayden from 111.229.79.17 port 32924 ssh2
2020-08-28 12:11:43
129.28.154.240 attackspam
Aug 28 10:56:34 webhost01 sshd[26873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.154.240
Aug 28 10:56:36 webhost01 sshd[26873]: Failed password for invalid user nuevo from 129.28.154.240 port 51666 ssh2
...
2020-08-28 12:15:41
112.85.42.176 attackbotsspam
Aug 28 06:28:37 jane sshd[2640]: Failed password for root from 112.85.42.176 port 37318 ssh2
Aug 28 06:28:42 jane sshd[2640]: Failed password for root from 112.85.42.176 port 37318 ssh2
...
2020-08-28 12:29:51
218.92.0.205 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-28T03:51:55Z and 2020-08-28T04:00:28Z
2020-08-28 12:04:39
52.231.78.9 attackspambots
2020-08-28 06:07:35 dovecot_login authenticator failed for \(ADMIN\) \[52.231.78.9\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2020-08-28 06:09:50 dovecot_login authenticator failed for \(ADMIN\) \[52.231.78.9\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2020-08-28 06:12:06 dovecot_login authenticator failed for \(ADMIN\) \[52.231.78.9\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2020-08-28 06:14:21 dovecot_login authenticator failed for \(ADMIN\) \[52.231.78.9\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2020-08-28 06:16:37 dovecot_login authenticator failed for \(ADMIN\) \[52.231.78.9\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2020-08-28 12:33:00
218.92.0.247 attackspambots
Aug 28 06:07:32 ip106 sshd[28701]: Failed password for root from 218.92.0.247 port 4042 ssh2
Aug 28 06:07:37 ip106 sshd[28701]: Failed password for root from 218.92.0.247 port 4042 ssh2
...
2020-08-28 12:14:42
107.180.227.163 attack
wp-login.php
2020-08-28 12:22:59

Recently Reported IPs

76.243.107.152 141.214.5.254 211.162.17.126 88.106.209.181
0.249.46.22 173.69.155.70 102.181.72.217 250.127.105.109
194.45.197.214 194.45.197.25 194.45.197.29 247.138.40.190
149.77.130.138 30.164.160.164 160.2.119.237 202.104.12.190
79.14.125.175 0.48.27.213 26.98.26.212 6.13.145.166