Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.196.17.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.196.17.220.			IN	A

;; AUTHORITY SECTION:
.			245	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042101 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 14:41:54 CST 2020
;; MSG SIZE  rcvd: 118
Host info
220.17.196.134.in-addr.arpa domain name pointer cm-134-196-17-220.revip18.asianet.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.17.196.134.in-addr.arpa	name = cm-134-196-17-220.revip18.asianet.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.20.204.41 attack
Unauthorized connection attempt from IP address 81.20.204.41 on Port 445(SMB)
2020-05-10 04:50:07
216.243.31.2 attackspam
firewall-block, port(s): 443/tcp
2020-05-10 05:15:01
78.172.113.85 attackspam
20/5/9@16:30:35: FAIL: Alarm-Intrusion address from=78.172.113.85
...
2020-05-10 05:07:02
139.59.66.101 attack
May  9 22:54:29 vps647732 sshd[17002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
May  9 22:54:31 vps647732 sshd[17002]: Failed password for invalid user universal from 139.59.66.101 port 60772 ssh2
...
2020-05-10 05:11:59
185.183.106.121 attackbots
May  9 22:30:33 ncomp sshd[14604]: Invalid user Administrator from 185.183.106.121
May  9 22:30:35 ncomp sshd[14604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.183.106.121
May  9 22:30:33 ncomp sshd[14604]: Invalid user Administrator from 185.183.106.121
May  9 22:30:38 ncomp sshd[14604]: Failed password for invalid user Administrator from 185.183.106.121 port 1652 ssh2
2020-05-10 05:04:11
176.37.100.247 attackspambots
2020-05-09T14:37:02.023536linuxbox-skyline sshd[52830]: Invalid user afe from 176.37.100.247 port 51550
...
2020-05-10 04:45:50
187.212.98.210 attackspambots
May  9 22:30:36 ArkNodeAT sshd\[24864\]: Invalid user rsync from 187.212.98.210
May  9 22:30:36 ArkNodeAT sshd\[24864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.212.98.210
May  9 22:30:39 ArkNodeAT sshd\[24864\]: Failed password for invalid user rsync from 187.212.98.210 port 40032 ssh2
2020-05-10 04:42:22
1.196.4.183 attackspam
Unauthorized connection attempt from IP address 1.196.4.183 on Port 445(SMB)
2020-05-10 05:03:34
31.42.74.75 attackbotsspam
Unauthorized connection attempt from IP address 31.42.74.75 on Port 445(SMB)
2020-05-10 05:04:27
58.87.97.166 attack
2020-05-09T22:30:58.581526rocketchat.forhosting.nl sshd[5094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.97.166
2020-05-09T22:30:58.578182rocketchat.forhosting.nl sshd[5094]: Invalid user philip from 58.87.97.166 port 42736
2020-05-09T22:31:00.399288rocketchat.forhosting.nl sshd[5094]: Failed password for invalid user philip from 58.87.97.166 port 42736 ssh2
...
2020-05-10 04:36:09
85.209.0.174 attackbots
nft/Honeypot/22/73e86
2020-05-10 04:38:35
138.19.25.251 attack
DATE:2020-05-09 22:30:56, IP:138.19.25.251, PORT:ssh SSH brute force auth (docker-dc)
2020-05-10 04:43:40
42.200.148.195 attack
HK_MAINT-HK-PCCW-BIA-CS_<177>1589056271 [1:2403342:57153] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 22 [Classification: Misc Attack] [Priority: 2]:  {TCP} 42.200.148.195:16016
2020-05-10 04:47:39
129.204.23.5 attackspam
May  9 22:26:13 meumeu sshd[6918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.23.5 
May  9 22:26:15 meumeu sshd[6918]: Failed password for invalid user beth from 129.204.23.5 port 53338 ssh2
May  9 22:30:52 meumeu sshd[7646]: Failed password for root from 129.204.23.5 port 48958 ssh2
...
2020-05-10 04:46:01
122.51.2.33 attackbots
20 attempts against mh-ssh on install-test
2020-05-10 05:13:47

Recently Reported IPs

44.229.206.70 24.230.193.100 73.105.246.241 94.194.45.141
86.13.222.91 127.106.209.244 243.248.168.126 72.67.94.46
235.200.113.250 136.147.138.59 68.107.249.37 103.217.232.83
139.38.88.215 124.80.143.233 97.227.194.59 91.122.233.27
101.156.81.241 13.68.213.186 1.55.254.89 118.174.90.250