Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stemwede

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.19.57.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.19.57.106.			IN	A

;; AUTHORITY SECTION:
.			567	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110201 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 03:36:20 CST 2019
;; MSG SIZE  rcvd: 117
Host info
106.57.19.134.in-addr.arpa domain name pointer v4-8613396a.pool.vitroconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.57.19.134.in-addr.arpa	name = v4-8613396a.pool.vitroconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
31.223.3.10 attackspam
spam
2020-01-22 17:08:00
193.213.89.72 attackbots
spam
2020-01-22 17:11:11
23.129.64.154 attackspam
spam
2020-01-22 16:44:22
112.78.0.37 attackbotsspam
email spam
2020-01-22 17:14:13
190.105.213.165 attack
spam
2020-01-22 16:46:57
200.77.186.208 attackbots
spam
2020-01-22 16:45:56
222.186.180.223 attackspambots
Jan 22 05:51:04 server sshd\[9962\]: Failed password for root from 222.186.180.223 port 49886 ssh2
Jan 22 05:51:07 server sshd\[9954\]: Failed password for root from 222.186.180.223 port 24640 ssh2
Jan 22 11:55:24 server sshd\[5522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Jan 22 11:55:26 server sshd\[5522\]: Failed password for root from 222.186.180.223 port 60302 ssh2
Jan 22 11:55:29 server sshd\[5522\]: Failed password for root from 222.186.180.223 port 60302 ssh2
...
2020-01-22 16:57:12
59.89.195.253 attackbotsspam
unauthorized connection attempt
2020-01-22 16:53:34
89.40.115.119 attackspambots
email spam
2020-01-22 16:52:48
220.79.34.109 attack
spam
2020-01-22 17:09:10
105.179.10.182 attackbotsspam
spam
2020-01-22 17:14:33
49.145.203.233 attackspam
unauthorized connection attempt
2020-01-22 16:54:28
177.84.146.44 attackbots
spam
2020-01-22 16:48:58
185.153.199.242 attackbots
01/22/2020-04:09:49.785171 185.153.199.242 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-22 17:12:16
31.46.236.14 attackbots
spam
2020-01-22 17:08:12

Recently Reported IPs

94.40.50.91 65.97.76.117 237.59.151.196 71.212.141.157
50.213.229.66 130.70.210.55 58.220.87.226 171.25.184.83
183.175.56.55 66.10.148.245 218.75.168.94 31.217.215.69
92.167.241.252 24.90.157.10 125.117.145.98 95.210.229.92
3.215.223.180 251.117.202.221 7.94.184.100 236.34.115.165