Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Abingdon

Region: Maryland

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.194.245.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38279
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.194.245.209.		IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070401 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 05 08:36:15 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 209.245.194.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 209.245.194.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.92.61.242 attack
Automatic report - Banned IP Access
2020-01-08 05:38:29
103.106.1.110 attack
01/07/2020-22:20:18.916038 103.106.1.110 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-01-08 05:51:40
157.245.4.75 attack
Unauthorized connection attempt detected from IP address 157.245.4.75 to port 7999 [J]
2020-01-08 05:55:13
113.116.132.160 attackbots
Port 1433 Scan
2020-01-08 05:46:59
103.85.228.33 attackspam
Unauthorized connection attempt detected from IP address 103.85.228.33 to port 23 [J]
2020-01-08 05:50:30
142.93.142.173 attackbots
142.93.142.173 - - [07/Jan/2020:22:20:12 +0100] "GET /wp-login.php HTTP/1.1" 404 454
...
2020-01-08 05:55:28
159.203.36.154 attackspambots
Unauthorized connection attempt detected from IP address 159.203.36.154 to port 2220 [J]
2020-01-08 05:51:53
80.66.81.143 attack
Jan  7 22:52:13 web1 postfix/smtpd\[2020\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  7 22:52:37 web1 postfix/smtpd\[2020\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  7 22:58:12 web1 postfix/smtpd\[2038\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-08 06:00:39
58.181.215.43 attackbots
Jan  7 22:26:28 zulu1842 sshd[26695]: Invalid user fe from 58.181.215.43
Jan  7 22:26:28 zulu1842 sshd[26695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.181.215.43 
Jan  7 22:26:29 zulu1842 sshd[26695]: Failed password for invalid user fe from 58.181.215.43 port 39476 ssh2
Jan  7 22:26:30 zulu1842 sshd[26695]: Received disconnect from 58.181.215.43: 11: Bye Bye [preauth]
Jan  7 22:32:11 zulu1842 sshd[27142]: Invalid user cs from 58.181.215.43
Jan  7 22:32:11 zulu1842 sshd[27142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.181.215.43 
Jan  7 22:32:14 zulu1842 sshd[27142]: Failed password for invalid user cs from 58.181.215.43 port 46826 ssh2
Jan  7 22:32:14 zulu1842 sshd[27142]: Received disconnect from 58.181.215.43: 11: Bye Bye [preauth]
Jan  7 22:34:30 zulu1842 sshd[27339]: Invalid user lxf from 58.181.215.43
Jan  7 22:34:30 zulu1842 sshd[27339]: pam_unix(sshd:auth): authe........
-------------------------------
2020-01-08 05:54:36
39.9.222.12 attackbots
Jan  7 23:31:13 server sshd\[2823\]: Invalid user service from 39.9.222.12
Jan  7 23:31:13 server sshd\[2823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39-9-222-12.adsl.fetnet.net 
Jan  7 23:31:15 server sshd\[2823\]: Failed password for invalid user service from 39.9.222.12 port 12790 ssh2
Jan  8 00:23:18 server sshd\[15466\]: Invalid user admin from 39.9.222.12
Jan  8 00:23:18 server sshd\[15466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39-9-222-12.adsl.fetnet.net 
...
2020-01-08 05:58:10
60.216.106.162 attack
Automatic report - Banned IP Access
2020-01-08 05:43:20
113.175.87.55 attack
20/1/7@16:20:49: FAIL: Alarm-Network address from=113.175.87.55
...
2020-01-08 05:30:16
89.25.21.170 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-01-08 05:49:07
121.201.1.169 attack
" "
2020-01-08 05:29:50
80.212.111.238 attack
Jan  7 21:20:56 thevastnessof sshd[24177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.212.111.238
...
2020-01-08 05:27:23

Recently Reported IPs

217.44.207.42 217.23.160.23 196.191.34.192 122.50.44.93
82.127.143.45 207.62.101.90 49.181.131.178 139.184.219.156
201.111.115.34 23.233.152.165 122.170.118.66 79.28.33.4
63.106.180.199 60.25.150.37 103.9.191.229 123.129.220.248
247.126.127.233 59.166.253.217 189.165.139.46 181.29.116.127