Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.19.164.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.19.164.28.			IN	A

;; AUTHORITY SECTION:
.			425	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:40:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
28.164.19.134.in-addr.arpa domain name pointer a134-19-164-28.xtrahost.co.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
28.164.19.134.in-addr.arpa	name = a134-19-164-28.xtrahost.co.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.125.238.228 attackbotsspam
Automatic report - Port Scan Attack
2020-09-25 15:32:38
157.55.39.178 attackbotsspam
Joomla User(visforms) : try to access forms...
2020-09-25 15:46:11
190.52.105.42 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-25 15:35:49
92.118.161.29 attackbots
Port scan denied
2020-09-25 15:39:10
178.16.174.0 attackbots
Invalid user u1 from 178.16.174.0 port 7518
2020-09-25 15:22:31
138.197.217.164 attackspambots
$f2bV_matches
2020-09-25 15:54:53
27.223.89.238 attack
Sep 25 07:09:56 *** sshd[14851]: Invalid user pdv from 27.223.89.238
2020-09-25 15:51:33
93.191.20.34 attackbots
Sep 25 06:49:24 l02a sshd[10879]: Invalid user sandeep from 93.191.20.34
Sep 25 06:49:24 l02a sshd[10879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.191.20.34 
Sep 25 06:49:24 l02a sshd[10879]: Invalid user sandeep from 93.191.20.34
Sep 25 06:49:26 l02a sshd[10879]: Failed password for invalid user sandeep from 93.191.20.34 port 44098 ssh2
2020-09-25 15:48:06
125.164.232.200 attackspam
Brute force blocker - service: proftpd1, proftpd2 - aantal: 164 - Sun Sep  2 15:45:18 2018
2020-09-25 15:24:44
52.247.66.65 attackspambots
Sep 25 09:27:25 markkoudstaal sshd[3426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.247.66.65
Sep 25 09:27:27 markkoudstaal sshd[3426]: Failed password for invalid user copresi from 52.247.66.65 port 37972 ssh2
Sep 25 09:42:12 markkoudstaal sshd[7622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.247.66.65
...
2020-09-25 15:49:46
52.250.118.10 attackbotsspam
SSH brutforce
2020-09-25 15:20:51
218.92.0.249 attack
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-25 15:31:45
106.13.34.131 attackspam
Sep 25 09:02:15 rancher-0 sshd[282693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
Sep 25 09:02:17 rancher-0 sshd[282693]: Failed password for root from 106.13.34.131 port 55863 ssh2
...
2020-09-25 15:28:09
52.150.8.43 attack
Automatic report BANNED IP
2020-09-25 15:39:39
219.142.14.126 attackspam
Icarus honeypot on github
2020-09-25 15:38:09

Recently Reported IPs

134.181.132.44 134.184.0.233 134.19.147.50 134.184.129.2
134.19.181.135 134.192.18.30 134.19.175.32 134.19.181.94
134.195.14.20 134.195.90.155 134.195.13.23 134.19.181.141
134.197.15.101 134.197.186.30 134.197.190.16 134.193.116.82
134.209.1.186 134.198.4.85 134.2.5.111 134.209.101.33