Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: New Taipei

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.208.3.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.208.3.65.			IN	A

;; AUTHORITY SECTION:
.			49	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 15 16:05:10 CST 2023
;; MSG SIZE  rcvd: 105
Host info
65.3.208.134.in-addr.arpa domain name pointer web.csie.ndhu.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
65.3.208.134.in-addr.arpa	name = web.csie.ndhu.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.159.18.20 attack
$f2bV_matches
2019-10-13 19:15:44
123.206.13.46 attackbots
$f2bV_matches_ltvn
2019-10-13 19:42:12
188.186.211.60 attackspam
Port 1433 Scan
2019-10-13 19:43:56
202.51.74.27 attack
Automatic report - XMLRPC Attack
2019-10-13 19:41:22
207.46.13.63 attackbots
Automatic report - Banned IP Access
2019-10-13 19:03:18
178.150.216.229 attackspambots
k+ssh-bruteforce
2019-10-13 19:12:37
180.168.198.142 attack
Oct 13 07:52:07 MK-Soft-VM4 sshd[6160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.198.142 
Oct 13 07:52:09 MK-Soft-VM4 sshd[6160]: Failed password for invalid user Vacation2017 from 180.168.198.142 port 42568 ssh2
...
2019-10-13 19:09:42
184.168.27.53 attack
Automatic report - XMLRPC Attack
2019-10-13 19:32:20
186.0.89.178 attackbots
Port 1433 Scan
2019-10-13 19:46:28
106.12.68.192 attackbots
Oct 13 03:14:57 localhost sshd\[21440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.68.192  user=root
Oct 13 03:15:00 localhost sshd\[21440\]: Failed password for root from 106.12.68.192 port 39794 ssh2
Oct 13 03:44:17 localhost sshd\[21838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.68.192  user=root
...
2019-10-13 19:28:09
116.197.154.170 attackspambots
Telnet Server BruteForce Attack
2019-10-13 19:36:43
206.189.204.63 attackspam
Automatic report - Banned IP Access
2019-10-13 19:33:55
198.98.58.198 attack
Oct 13 07:54:23 firewall sshd[5319]: Failed password for root from 198.98.58.198 port 45608 ssh2
Oct 13 07:58:05 firewall sshd[5566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.58.198  user=root
Oct 13 07:58:07 firewall sshd[5566]: Failed password for root from 198.98.58.198 port 57710 ssh2
...
2019-10-13 19:03:34
183.131.82.99 attack
Oct 13 13:09:09 jane sshd[17007]: Failed password for root from 183.131.82.99 port 42046 ssh2
Oct 13 13:09:16 jane sshd[17007]: Failed password for root from 183.131.82.99 port 42046 ssh2
...
2019-10-13 19:11:10
50.62.208.97 attackbots
Automatic report - XMLRPC Attack
2019-10-13 19:36:26

Recently Reported IPs

193.6.168.208 146.110.195.249 140.116.74.18 115.178.223.206
212.111.193.31 157.110.56.213 197.136.148.174 140.123.124.86
152.242.63.18 210.72.10.85 124.16.140.35 202.29.224.226
140.117.69.1 140.116.67.29 141.35.104.106 217.173.194.18
140.116.10.6 159.226.176.87 89.45.27.76 140.116.233.154