Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.191.24.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.191.24.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:58:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 118.24.191.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.24.191.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.148 attackbots
Apr 23 20:12:26 vpn01 sshd[7721]: Failed password for root from 222.186.175.148 port 60800 ssh2
Apr 23 20:12:29 vpn01 sshd[7721]: Failed password for root from 222.186.175.148 port 60800 ssh2
...
2020-04-24 02:19:58
1.222.126.235 attackbotsspam
Unauthorized connection attempt detected from IP address 1.222.126.235 to port 445 [T]
2020-04-24 02:02:17
185.82.76.220 attack
Sending SPAM email
2020-04-24 02:08:34
80.211.245.129 attackspam
Apr 23 19:45:50 DAAP sshd[24898]: Invalid user zj from 80.211.245.129 port 58328
Apr 23 19:45:50 DAAP sshd[24898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.245.129
Apr 23 19:45:50 DAAP sshd[24898]: Invalid user zj from 80.211.245.129 port 58328
Apr 23 19:45:52 DAAP sshd[24898]: Failed password for invalid user zj from 80.211.245.129 port 58328 ssh2
Apr 23 19:51:42 DAAP sshd[24978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.245.129  user=root
Apr 23 19:51:44 DAAP sshd[24978]: Failed password for root from 80.211.245.129 port 44152 ssh2
...
2020-04-24 02:04:49
46.98.48.113 attack
Unauthorised access (Apr 23) SRC=46.98.48.113 LEN=52 TTL=120 ID=3318 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-24 02:29:47
116.50.224.226 attackbots
(sshd) Failed SSH login from 116.50.224.226 (PH/Philippines/226.224.50.116.ids.service.static.eastern-tele.com): 5 in the last 3600 secs
2020-04-24 02:26:09
5.45.69.188 attackbotsspam
Dear Sir / Madam, 

Yesterday, my close friend (Simona Simova) was contacted via fake Facebook profile to be informed that she has a profile on a escort website. While researching via the German phone number used in the advert, we have came across more ads. These profiles are created without her permission and she is now very upset. 

Here is a list of the profiles we have found: 

- https://escortsitesofia.com/de/eleonora-7/ (5.45.69.188)
- https://escortsitesofia.com/de/sia-9/ (5.45.69.188)


We have already hired a lawyer in Germany who will escalate the issue to the authorities.
2020-04-24 02:07:12
189.59.5.49 attackspambots
SSH invalid-user multiple login try
2020-04-24 02:16:20
125.212.172.122 attack
Unauthorized connection attempt from IP address 125.212.172.122 on Port 445(SMB)
2020-04-24 02:13:03
152.136.108.226 attackspam
Lines containing failures of 152.136.108.226
Apr 22 06:28:11 kmh-wmh-001-nbg01 sshd[12304]: Invalid user test2 from 152.136.108.226 port 47218
Apr 22 06:28:11 kmh-wmh-001-nbg01 sshd[12304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.108.226 
Apr 22 06:28:13 kmh-wmh-001-nbg01 sshd[12304]: Failed password for invalid user test2 from 152.136.108.226 port 47218 ssh2
Apr 22 06:28:14 kmh-wmh-001-nbg01 sshd[12304]: Received disconnect from 152.136.108.226 port 47218:11: Bye Bye [preauth]
Apr 22 06:28:14 kmh-wmh-001-nbg01 sshd[12304]: Disconnected from invalid user test2 152.136.108.226 port 47218 [preauth]
Apr 22 06:36:48 kmh-wmh-001-nbg01 sshd[13251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.108.226  user=r.r
Apr 22 06:36:50 kmh-wmh-001-nbg01 sshd[13251]: Failed password for r.r from 152.136.108.226 port 37170 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.htm
2020-04-24 02:23:43
37.187.60.182 attack
Brute-force attempt banned
2020-04-24 02:34:48
137.220.180.17 attackbotsspam
SSH Brute-Force attacks
2020-04-24 02:24:57
103.10.30.204 attackbotsspam
DATE:2020-04-23 19:51:36, IP:103.10.30.204, PORT:ssh SSH brute force auth (docker-dc)
2020-04-24 02:28:09
89.38.147.247 attackspam
(sshd) Failed SSH login from 89.38.147.247 (GB/United Kingdom/host247-147-38-89.static.arubacloud.com): 5 in the last 3600 secs
2020-04-24 02:22:34
120.53.22.204 attack
2020-04-23T19:51:55.582103ns386461 sshd\[23720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.22.204  user=root
2020-04-23T19:51:57.870989ns386461 sshd\[23720\]: Failed password for root from 120.53.22.204 port 55370 ssh2
2020-04-23T20:06:06.570991ns386461 sshd\[4312\]: Invalid user postgres from 120.53.22.204 port 57068
2020-04-23T20:06:06.575498ns386461 sshd\[4312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.22.204
2020-04-23T20:06:08.357858ns386461 sshd\[4312\]: Failed password for invalid user postgres from 120.53.22.204 port 57068 ssh2
...
2020-04-24 02:11:00

Recently Reported IPs

41.208.205.163 195.74.156.85 178.70.86.31 118.242.168.8
161.229.122.224 86.168.158.249 253.249.107.103 198.243.235.248
152.33.37.91 205.101.6.123 235.22.120.42 212.113.27.125
140.84.203.45 109.114.25.180 131.101.142.50 64.22.219.65
28.49.245.117 199.131.237.207 172.179.21.135 101.178.73.183