Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.188.214.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.188.214.100.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 16:09:42 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 100.214.188.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.214.188.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.201 attackbots
SSH Bruteforce
2020-08-06 06:01:58
49.232.132.144 attack
Aug  5 22:30:05 plg sshd[17925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.132.144  user=root
Aug  5 22:30:06 plg sshd[17925]: Failed password for invalid user root from 49.232.132.144 port 60850 ssh2
Aug  5 22:33:27 plg sshd[17981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.132.144  user=root
Aug  5 22:33:29 plg sshd[17981]: Failed password for invalid user root from 49.232.132.144 port 40984 ssh2
Aug  5 22:36:34 plg sshd[18030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.132.144  user=root
Aug  5 22:36:37 plg sshd[18030]: Failed password for invalid user root from 49.232.132.144 port 49346 ssh2
Aug  5 22:39:47 plg sshd[18129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.132.144  user=root
...
2020-08-06 06:18:38
118.89.78.131 attackbots
2020-08-05T05:05:25.496650correo.[domain] sshd[39176]: Failed password for root from 118.89.78.131 port 59766 ssh2 2020-08-05T05:09:39.548783correo.[domain] sshd[40046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.78.131 user=root 2020-08-05T05:09:41.360947correo.[domain] sshd[40046]: Failed password for root from 118.89.78.131 port 46730 ssh2 ...
2020-08-06 06:24:34
177.128.216.5 attackbotsspam
Aug  5 22:28:43 xeon sshd[25894]: Failed password for root from 177.128.216.5 port 48697 ssh2
2020-08-06 06:07:32
148.251.195.14 attack
20 attempts against mh-misbehave-ban on flare
2020-08-06 06:17:40
211.80.102.184 attackspambots
Aug  5 22:29:07 xeon sshd[25902]: Failed password for root from 211.80.102.184 port 14079 ssh2
2020-08-06 06:04:54
122.51.217.131 attack
firewall-block, port(s): 20273/tcp
2020-08-06 05:56:37
49.75.199.214 attackbots
Aug  5 22:30:44 xeon sshd[26120]: Failed password for root from 49.75.199.214 port 39426 ssh2
2020-08-06 06:06:25
210.14.142.85 attack
Aug  5 23:41:15 server sshd[6655]: Failed password for root from 210.14.142.85 port 37014 ssh2
Aug  5 23:45:23 server sshd[12940]: Failed password for root from 210.14.142.85 port 41404 ssh2
Aug  5 23:49:30 server sshd[19030]: Failed password for root from 210.14.142.85 port 45788 ssh2
2020-08-06 05:56:19
94.102.53.112 attack
Aug  6 00:22:33 debian-2gb-nbg1-2 kernel: \[18924612.262920\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.53.112 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=35027 PROTO=TCP SPT=44873 DPT=14969 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-06 06:23:22
45.14.224.219 attackbots
SmallBizIT.US 1 packets to tcp(23)
2020-08-06 06:04:27
163.172.9.10 attack
Port Scan detected!
...
2020-08-06 05:53:30
92.63.197.95 attackspam
34042/tcp 33964/tcp 33985/tcp...
[2020-06-06/08-05]832pkt,276pt.(tcp)
2020-08-06 05:57:27
213.251.184.102 attackbotsspam
20 attempts against mh-ssh on cloud
2020-08-06 06:15:24
111.230.241.110 attack
Aug  6 00:55:53 hosting sshd[16654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.241.110  user=root
Aug  6 00:55:55 hosting sshd[16654]: Failed password for root from 111.230.241.110 port 56510 ssh2
Aug  6 01:01:51 hosting sshd[17212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.241.110  user=root
Aug  6 01:01:52 hosting sshd[17212]: Failed password for root from 111.230.241.110 port 34708 ssh2
...
2020-08-06 06:13:08

Recently Reported IPs

139.253.65.209 191.183.143.210 166.58.45.228 92.76.157.244
7.58.231.109 61.154.223.131 126.135.157.121 57.10.26.23
143.32.127.227 250.197.236.128 40.238.72.208 104.120.127.205
146.145.184.196 179.203.85.173 21.40.58.18 223.147.245.184
222.146.126.140 121.153.148.208 128.187.38.19 136.4.70.138