Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Evansville

Region: Indiana

Country: United States

Internet Service Provider: RTC Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.204.50.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.204.50.164.			IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 28 12:49:16 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 164.50.204.134.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 164.50.204.134.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
113.22.75.174 attack
445
2020-09-10 05:36:25
45.82.137.35 attack
Sep  9 20:57:06 MainVPS sshd[7695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.137.35  user=root
Sep  9 20:57:08 MainVPS sshd[7695]: Failed password for root from 45.82.137.35 port 35584 ssh2
Sep  9 21:01:11 MainVPS sshd[472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.137.35  user=root
Sep  9 21:01:13 MainVPS sshd[472]: Failed password for root from 45.82.137.35 port 41320 ssh2
Sep  9 21:05:22 MainVPS sshd[30448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.137.35  user=root
Sep  9 21:05:24 MainVPS sshd[30448]: Failed password for root from 45.82.137.35 port 47056 ssh2
...
2020-09-10 05:12:44
122.121.24.73 attackbots
Port probing on unauthorized port 23
2020-09-10 05:30:16
167.114.86.47 attackspam
2020-09-09T22:55:24.292386ks3355764 sshd[22276]: Failed password for root from 167.114.86.47 port 49252 ssh2
2020-09-09T22:57:26.536794ks3355764 sshd[22294]: Invalid user zxin10 from 167.114.86.47 port 35746
...
2020-09-10 05:45:11
92.154.89.19 attack
Dovecot Invalid User Login Attempt.
2020-09-10 05:33:50
42.113.144.86 attackbotsspam
20/9/9@12:54:31: FAIL: Alarm-Network address from=42.113.144.86
20/9/9@12:54:31: FAIL: Alarm-Network address from=42.113.144.86
...
2020-09-10 05:34:52
80.80.36.61 attackbots
Port probing on unauthorized port 445
2020-09-10 05:39:24
85.209.0.52 attackbotsspam
 TCP (SYN) 85.209.0.52:11392 -> port 22, len 60
2020-09-10 05:12:11
162.142.125.52 attackspambots
Unauthorized connection attempt from IP address 162.142.125.52 on Port 143(IMAP)
2020-09-10 05:10:17
46.105.102.68 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-10 05:42:33
220.249.112.148 attackbotsspam
Automatic Fail2ban report - Trying login SSH
2020-09-10 05:21:17
51.77.140.36 attackbots
SSH Brute Force
2020-09-10 05:18:10
54.39.138.246 attack
*Port Scan* detected from 54.39.138.246 (CA/Canada/Alberta/St. Albert/ip246.ip-54-39-138.net). 4 hits in the last 105 seconds
2020-09-10 05:16:34
184.105.247.247 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-10 05:24:15
61.177.172.168 attackspambots
Failed password for invalid user from 61.177.172.168 port 34310 ssh2
2020-09-10 05:15:14

Recently Reported IPs

134.26.23.91 134.180.237.127 132.183.86.73 14.170.202.21
82.18.216.157 39.29.59.194 224.20.143.86 6.203.113.138
124.3.140.26 120.247.103.46 252.130.220.13 129.160.37.46
129.13.41.236 43.43.218.221 53.114.120.81 228.97.130.93
176.193.33.105 49.124.217.201 135.203.136.163 24.163.203.197