Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fujiyoshida

Region: Yamanasi (Yamanashi)

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.180.134.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8794
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.180.134.249.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 15 23:40:10 CST 2025
;; MSG SIZE  rcvd: 108
Host info
249.134.180.134.in-addr.arpa domain name pointer dynamic-134-180-134-249.gol.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.134.180.134.in-addr.arpa	name = dynamic-134-180-134-249.gol.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.231.34.187 attack
Unauthorized connection attempt detected, IP banned.
2020-03-02 01:14:09
131.0.36.238 attackbots
Automatic report - Port Scan Attack
2020-03-02 00:36:52
5.135.94.191 attackspambots
SSH Brute-Forcing (server2)
2020-03-02 01:13:40
78.161.33.107 attackspambots
Brute-force general attack.
2020-03-02 01:02:05
104.215.152.111 attack
Unauthorized connection attempt detected from IP address 104.215.152.111 to port 22 [J]
2020-03-02 01:07:27
195.60.250.200 attack
1583068989 - 03/01/2020 14:23:09 Host: 195.60.250.200/195.60.250.200 Port: 445 TCP Blocked
2020-03-02 00:56:45
94.102.49.190 attackspambots
Port scan: Attack repeated for 24 hours
2020-03-02 00:54:05
113.162.7.137 attackbotsspam
$f2bV_matches
2020-03-02 01:05:31
107.179.192.160 attackbotsspam
B: Magento admin pass test (wrong country)
2020-03-02 00:43:21
95.111.59.210 attackspambots
Unauthorized connection attempt detected from IP address 95.111.59.210 to port 22 [J]
2020-03-02 00:38:15
222.186.15.91 attackbots
2020-03-02T04:07:52.125001luisaranguren sshd[2959430]: Failed password for root from 222.186.15.91 port 30486 ssh2
2020-03-02T04:07:54.774068luisaranguren sshd[2959430]: Failed password for root from 222.186.15.91 port 30486 ssh2
...
2020-03-02 01:12:03
46.182.5.20 attackspam
Email Spam, Malware
2020-03-02 01:13:16
118.24.36.247 attack
$f2bV_matches
2020-03-02 01:15:31
117.240.172.19 attack
Mar  1 17:08:37 ns381471 sshd[17034]: Failed password for debian-spamd from 117.240.172.19 port 44795 ssh2
2020-03-02 00:40:42
86.122.144.43 attackbots
Unauthorized connection attempt detected from IP address 86.122.144.43 to port 23 [J]
2020-03-02 00:51:58

Recently Reported IPs

241.18.179.178 82.56.58.75 121.49.56.202 44.36.86.122
161.179.45.127 135.173.145.143 203.212.107.147 50.247.99.241
129.223.57.105 226.71.252.15 77.116.207.245 90.194.53.99
233.214.94.5 90.139.57.175 25.88.49.20 54.242.36.94
233.62.104.130 13.49.37.97 109.236.60.76 193.221.20.225