Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
134.196.136.98 attack
1585950082 - 04/03/2020 23:41:22 Host: 134.196.136.98/134.196.136.98 Port: 445 TCP Blocked
2020-04-04 06:27:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.196.136.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.196.136.142.		IN	A

;; AUTHORITY SECTION:
.			454	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010401 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 05 02:39:45 CST 2022
;; MSG SIZE  rcvd: 108
Host info
142.136.196.134.in-addr.arpa domain name pointer cm-134-196-136-142.revip18.asianet.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.136.196.134.in-addr.arpa	name = cm-134-196-136-142.revip18.asianet.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.234.216.28 attack
MYH,DEF GET /wp-login.php
GET //wp-login.php
2020-06-30 00:55:11
79.188.68.89 attack
Jun 29 07:26:47 ny01 sshd[15571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.89
Jun 29 07:26:50 ny01 sshd[15571]: Failed password for invalid user lorenza from 79.188.68.89 port 54677 ssh2
Jun 29 07:33:25 ny01 sshd[16573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.89
2020-06-30 01:07:51
74.83.245.195 spambotsattackproxynormal
Fuck u bitches
2020-06-30 01:32:56
41.72.23.152 attackbotsspam
$f2bV_matches
2020-06-30 01:34:51
171.242.68.243 attackbots
Unauthorized connection attempt: SRC=171.242.68.243
...
2020-06-30 01:37:40
200.52.80.34 attack
srv02 SSH BruteForce Attacks 22 ..
2020-06-30 01:25:49
40.118.226.96 attackspambots
Jun 29 14:34:41 gestao sshd[22725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.118.226.96 
Jun 29 14:34:44 gestao sshd[22725]: Failed password for invalid user darwin from 40.118.226.96 port 41052 ssh2
Jun 29 14:38:25 gestao sshd[22869]: Failed password for root from 40.118.226.96 port 41448 ssh2
...
2020-06-30 01:13:02
78.155.39.227 attackspambots
xmlrpc attack
2020-06-30 01:12:43
186.248.93.43 attack
Jun 29 16:34:23 sip sshd[17138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.248.93.43
Jun 29 16:34:26 sip sshd[17138]: Failed password for invalid user hml from 186.248.93.43 port 29697 ssh2
Jun 29 16:50:55 sip sshd[23239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.248.93.43
2020-06-30 01:17:32
60.251.183.61 attackspambots
Jun 29 13:08:46 ArkNodeAT sshd\[27130\]: Invalid user cd from 60.251.183.61
Jun 29 13:08:46 ArkNodeAT sshd\[27130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.183.61
Jun 29 13:08:48 ArkNodeAT sshd\[27130\]: Failed password for invalid user cd from 60.251.183.61 port 58328 ssh2
2020-06-30 01:28:35
51.68.251.202 attackbots
2020-06-29T13:05:55.159193vps773228.ovh.net sshd[28118]: Failed password for invalid user dorian from 51.68.251.202 port 59614 ssh2
2020-06-29T13:09:00.447313vps773228.ovh.net sshd[28139]: Invalid user hospital from 51.68.251.202 port 58054
2020-06-29T13:09:00.462418vps773228.ovh.net sshd[28139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip202.ip-51-68-251.eu
2020-06-29T13:09:00.447313vps773228.ovh.net sshd[28139]: Invalid user hospital from 51.68.251.202 port 58054
2020-06-29T13:09:02.708677vps773228.ovh.net sshd[28139]: Failed password for invalid user hospital from 51.68.251.202 port 58054 ssh2
...
2020-06-30 01:14:33
125.64.94.131 attack
 TCP (SYN) 125.64.94.131:56060 -> port 8001, len 44
2020-06-30 01:32:15
162.144.141.141 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-30 01:29:37
185.176.27.250 attackspam
Port scan: Attack repeated for 24 hours
2020-06-30 01:23:34
167.71.196.176 attackbotsspam
SSH brute force attempt
2020-06-30 01:23:49

Recently Reported IPs

166.235.73.18 113.42.160.135 157.35.185.92 200.226.135.9
243.193.9.224 80.134.37.167 199.2.88.229 88.241.50.0
48.142.205.206 192.226.77.114 192.117.173.136 28.176.54.27
148.234.28.60 112.196.43.185 214.95.57.218 211.145.29.80
185.30.177.2 57.189.250.168 163.143.210.187 59.208.173.115