Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       134.195.43.0 - 134.195.43.255
CIDR:           134.195.43.0/24
NetName:        NCDS-NET2
NetHandle:      NET-134-195-43-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   NCDS CANADA (NC-717)
RegDate:        2020-06-25
Updated:        2020-06-25
Ref:            https://rdap.arin.net/registry/ip/134.195.43.0


OrgName:        NCDS CANADA
OrgId:          NC-717
Address:        440 Laurier Ave., W., Suite 200
City:           Ottawa
StateProv:      ON
PostalCode:     K1R 7X6
Country:        CA
RegDate:        2018-03-15
Updated:        2025-08-21
Ref:            https://rdap.arin.net/registry/entity/NC-717


OrgRoutingHandle: IST36-ARIN
OrgRoutingName:   IPXO Support Team
OrgRoutingPhone:  +1 (650) 564-3425  
OrgRoutingEmail:  support@ipxo.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

OrgAbuseHandle: PENNE65-ARIN
OrgAbuseName:   Penney, Jay 
OrgAbusePhone:  +1-613-703-3133 
OrgAbuseEmail:  jpenney@ncds.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/PENNE65-ARIN

OrgTechHandle: PENNE65-ARIN
OrgTechName:   Penney, Jay 
OrgTechPhone:  +1-613-703-3133 
OrgTechEmail:  jpenney@ncds.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/PENNE65-ARIN

OrgNOCHandle: PENNE65-ARIN
OrgNOCName:   Penney, Jay 
OrgNOCPhone:  +1-613-703-3133 
OrgNOCEmail:  jpenney@ncds.ca
OrgNOCRef:    https://rdap.arin.net/registry/entity/PENNE65-ARIN

OrgRoutingHandle: PENNE65-ARIN
OrgRoutingName:   Penney, Jay 
OrgRoutingPhone:  +1-613-703-3133 
OrgRoutingEmail:  jpenney@ncds.ca
OrgRoutingRef:    https://rdap.arin.net/registry/entity/PENNE65-ARIN

# end


# start

NetRange:       134.195.43.0 - 134.195.43.255
CIDR:           134.195.43.0/24
NetName:        IP-NET
NetHandle:      NET-134-195-43-0-2
Parent:         NCDS-NET2 (NET-134-195-43-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   IPXO LLC (IL-845)
RegDate:        2024-01-19
Updated:        2024-01-19
Ref:            https://rdap.arin.net/registry/ip/134.195.43.0


OrgName:        IPXO LLC
OrgId:          IL-845
Address:        3132 State Street
City:           Dallas
StateProv:      TX
PostalCode:     75204-3500
Country:        US
RegDate:        2021-03-25
Updated:        2025-09-10
Comment:        Geofeed https://geofeed.ipxo.com/geofeed.txt
Ref:            https://rdap.arin.net/registry/entity/IL-845


OrgAbuseHandle: IAMT1-ARIN
OrgAbuseName:   IPXO Abuse Management Team
OrgAbusePhone:  +1 (650) 934-1667 
OrgAbuseEmail:  abuse@ipxo.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IAMT1-ARIN

OrgDNSHandle: IST36-ARIN
OrgDNSName:   IPXO Support Team
OrgDNSPhone:  +1 (650) 564-3425  
OrgDNSEmail:  support@ipxo.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

OrgTechHandle: IST36-ARIN
OrgTechName:   IPXO Support Team
OrgTechPhone:  +1 (650) 564-3425  
OrgTechEmail:  support@ipxo.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

# end


# start

NetRange:       134.195.43.0 - 134.195.43.255
CIDR:           134.195.43.0/24
NetName:        NETUTILS
NetHandle:      NET-134-195-43-0-3
Parent:         IP-NET (NET-134-195-43-0-2)
NetType:        Reallocated
OriginAS:       
Organization:   Internet Utilities NA LLC (DCL-577)
RegDate:        2025-01-07
Updated:        2025-01-07
Ref:            https://rdap.arin.net/registry/ip/134.195.43.0



OrgName:        Internet Utilities NA LLC
OrgId:          DCL-577
Address:        2711 Centerville Road
City:           Wilmington
StateProv:      DE
PostalCode:     19808
Country:        US
RegDate:        2015-11-18
Updated:        2024-08-23
Ref:            https://rdap.arin.net/registry/entity/DCL-577


OrgTechHandle: IUS-ARIN
OrgTechName:   Internet Utilities Support
OrgTechPhone:  +1-650-564-3425 
OrgTechEmail:  support@netutils.io
OrgTechRef:    https://rdap.arin.net/registry/entity/IUS-ARIN

OrgAbuseHandle: IUA-ARIN
OrgAbuseName:   Internet Utilities Abuse
OrgAbusePhone:  +1-650-934-1667 
OrgAbuseEmail:  report@abuseradar.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IUA-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.195.43.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.195.43.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040501 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 03:03:34 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 13.43.195.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.43.195.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.112.121.63 attackspam
$f2bV_matches
2019-11-02 17:11:27
195.69.135.78 attack
email spam
2019-11-02 17:22:53
188.95.58.54 attackbots
From CCTV User Interface Log
...::ffff:188.95.58.54 - - [01/Nov/2019:23:46:53 +0000] "GET / HTTP/1.1" 200 960
::ffff:188.95.58.54 - - [01/Nov/2019:23:46:53 +0000] "GET / HTTP/1.1" 200 960
...
2019-11-02 16:58:42
103.26.40.143 attack
Nov  2 04:41:49 localhost sshd\[21225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.40.143  user=root
Nov  2 04:41:51 localhost sshd\[21225\]: Failed password for root from 103.26.40.143 port 34176 ssh2
Nov  2 04:46:39 localhost sshd\[21642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.40.143  user=root
2019-11-02 17:03:50
175.211.105.99 attack
Invalid user franciszek from 175.211.105.99 port 32966
2019-11-02 16:54:12
188.166.42.50 attack
2019-11-02T10:00:41.185763mail01 postfix/smtpd[11774]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-02T10:07:24.173401mail01 postfix/smtpd[23482]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-02T10:10:02.308661mail01 postfix/smtpd[25803]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-02 17:11:47
107.170.227.141 attackspam
Nov  2 06:53:53 icinga sshd[30485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141
Nov  2 06:53:55 icinga sshd[30485]: Failed password for invalid user brown from 107.170.227.141 port 58072 ssh2
...
2019-11-02 16:43:38
222.175.67.234 attack
Unauthorized connection attempt from IP address 222.175.67.234 on Port 445(SMB)
2019-11-02 17:23:10
143.0.178.142 attackspambots
Sent mail to target address hacked/leaked from abandonia in 2016
2019-11-02 16:48:26
200.77.186.218 attack
Autoban   200.77.186.218 AUTH/CONNECT
2019-11-02 17:11:02
200.182.172.131 attack
Invalid user qh from 200.182.172.131 port 51342
2019-11-02 17:07:57
111.198.18.109 attackspambots
2019-11-02T06:25:53.973912abusebot-8.cloudsearch.cf sshd\[6055\]: Invalid user haideweidaowozhidao from 111.198.18.109 port 50050
2019-11-02 16:49:59
94.191.9.85 attack
Oct 30 23:43:39 host sshd[7838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.9.85  user=r.r
Oct 30 23:43:41 host sshd[7838]: Failed password for r.r from 94.191.9.85 port 46420 ssh2
Oct 31 00:03:05 host sshd[9977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.9.85  user=r.r
Oct 31 00:03:07 host sshd[9977]: Failed password for r.r from 94.191.9.85 port 44892 ssh2
Oct 31 00:07:49 host sshd[18335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.9.85  user=r.r

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.191.9.85
2019-11-02 17:02:19
222.186.52.78 attackbots
Nov  2 09:57:56 v22018076622670303 sshd\[18871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.78  user=root
Nov  2 09:57:57 v22018076622670303 sshd\[18871\]: Failed password for root from 222.186.52.78 port 43783 ssh2
Nov  2 09:58:00 v22018076622670303 sshd\[18871\]: Failed password for root from 222.186.52.78 port 43783 ssh2
...
2019-11-02 17:06:38
182.61.170.251 attackbotsspam
Nov  2 10:11:07 vps01 sshd[13644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.170.251
Nov  2 10:11:10 vps01 sshd[13644]: Failed password for invalid user unit from 182.61.170.251 port 33518 ssh2
2019-11-02 17:18:47

Recently Reported IPs

2606:4700:10::6816:2410 235.109.20.87 216.118.251.170 164.92.103.98
124.165.80.232 69.3.141.153 192.6.246.43 134.59.154.3
2606:4700:10::6814:7577 2606:4700:10::6814:8984 2606:4700:10::6814:8753 2606:4700:10::6816:2281
2606:4700:10::6814:8707 2606:4700:10::ac43:2788 4.5.179.181 87.251.64.73
3.80.27.62 34.238.240.3 211.49.227.234 2606:4700:10::6814:4922