Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
134.209.223.106 attackbots
Port Scan
...
2020-09-18 22:20:33
134.209.223.106 attack
Port Scan
...
2020-09-18 14:35:44
134.209.223.106 attack
Auto Detect Rule!
proto TCP (SYN), 134.209.223.106:59985->gjan.info:21, len 40
2020-09-18 04:52:34
134.209.22.239 attack
" "
2020-08-31 17:07:10
134.209.22.239 attackspam
Port Scan detected!
...
2020-08-30 13:07:36
134.209.228.253 attack
Aug 20 08:08:50 cho sshd[1119932]: Failed password for root from 134.209.228.253 port 38796 ssh2
Aug 20 08:12:38 cho sshd[1120324]: Invalid user andrea from 134.209.228.253 port 46516
Aug 20 08:12:38 cho sshd[1120324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253 
Aug 20 08:12:38 cho sshd[1120324]: Invalid user andrea from 134.209.228.253 port 46516
Aug 20 08:12:40 cho sshd[1120324]: Failed password for invalid user andrea from 134.209.228.253 port 46516 ssh2
...
2020-08-20 15:26:20
134.209.228.253 attack
Aug 19 00:47:09 vpn01 sshd[10467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253
Aug 19 00:47:11 vpn01 sshd[10467]: Failed password for invalid user sb from 134.209.228.253 port 43792 ssh2
...
2020-08-19 07:57:25
134.209.228.253 attackspambots
Aug 14 02:10:15 web1 sshd\[28661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug 14 02:10:18 web1 sshd\[28661\]: Failed password for root from 134.209.228.253 port 42812 ssh2
Aug 14 02:14:05 web1 sshd\[28971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug 14 02:14:07 web1 sshd\[28971\]: Failed password for root from 134.209.228.253 port 52650 ssh2
Aug 14 02:18:00 web1 sshd\[29275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
2020-08-15 04:39:46
134.209.228.253 attack
Aug  3 20:48:36 localhost sshd[9499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug  3 20:48:38 localhost sshd[9499]: Failed password for root from 134.209.228.253 port 55766 ssh2
Aug  3 20:52:16 localhost sshd[9909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug  3 20:52:18 localhost sshd[9909]: Failed password for root from 134.209.228.253 port 39082 ssh2
Aug  3 20:55:59 localhost sshd[10333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug  3 20:56:01 localhost sshd[10333]: Failed password for root from 134.209.228.253 port 50628 ssh2
...
2020-08-04 07:56:19
134.209.228.253 attackbots
Jul 31 14:11:16 fhem-rasp sshd[14346]: Failed password for root from 134.209.228.253 port 33920 ssh2
Jul 31 14:11:16 fhem-rasp sshd[14346]: Disconnected from authenticating user root 134.209.228.253 port 33920 [preauth]
...
2020-07-31 20:34:52
134.209.220.69 attack
Exploited Host.
2020-07-26 03:18:21
134.209.228.253 attackspam
Invalid user yyh from 134.209.228.253 port 59744
2020-07-24 15:17:31
134.209.228.253 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-20 05:20:21
134.209.228.253 attackbotsspam
Jul 16 17:43:20 vps-51d81928 sshd[5171]: Invalid user aayush from 134.209.228.253 port 37602
Jul 16 17:43:20 vps-51d81928 sshd[5171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253 
Jul 16 17:43:20 vps-51d81928 sshd[5171]: Invalid user aayush from 134.209.228.253 port 37602
Jul 16 17:43:23 vps-51d81928 sshd[5171]: Failed password for invalid user aayush from 134.209.228.253 port 37602 ssh2
Jul 16 17:47:01 vps-51d81928 sshd[5232]: Invalid user atm from 134.209.228.253 port 52324
...
2020-07-17 04:39:28
134.209.228.253 attack
Several Attack
2020-07-17 00:49:41
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.209.22.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.209.22.48.			IN	A

;; AUTHORITY SECTION:
.			28	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:57:29 CST 2022
;; MSG SIZE  rcvd: 106
Host info
48.22.209.134.in-addr.arpa domain name pointer ytspam.h-educate.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.22.209.134.in-addr.arpa	name = ytspam.h-educate.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
70.125.240.42 attackspambots
T: f2b ssh aggressive 3x
2020-04-20 20:48:52
121.229.20.121 attackspam
Invalid user ftpuser from 121.229.20.121 port 57066
2020-04-20 20:29:01
129.211.10.228 attackbots
$f2bV_matches
2020-04-20 20:24:58
108.12.130.32 attackspambots
Invalid user wz from 108.12.130.32 port 33916
2020-04-20 20:38:15
67.205.138.198 attackspambots
$f2bV_matches
2020-04-20 20:49:05
61.19.86.219 attackspam
Invalid user testftp from 61.19.86.219 port 40014
2020-04-20 20:50:57
64.225.106.133 attack
$f2bV_matches
2020-04-20 20:50:09
52.230.1.232 attackbotsspam
Invalid user testing from 52.230.1.232 port 53886
2020-04-20 20:52:09
106.12.197.232 attack
Invalid user ci from 106.12.197.232 port 38504
2020-04-20 20:40:22
51.83.68.213 attack
Invalid user ubuntu from 51.83.68.213 port 44508
2020-04-20 20:53:07
123.58.5.243 attack
$f2bV_matches
2020-04-20 20:27:01
128.199.182.158 attack
Invalid user fk from 128.199.182.158 port 47828
2020-04-20 20:26:22
66.108.165.215 attackspam
Invalid user postgres from 66.108.165.215 port 47774
2020-04-20 20:49:36
51.91.110.249 attack
Invalid user csgoserver from 51.91.110.249 port 46402
2020-04-20 20:52:42
137.74.171.160 attack
Invalid user hn from 137.74.171.160 port 45892
2020-04-20 20:22:30

Recently Reported IPs

118.173.119.148 134.209.22.41 134.209.22.6 134.209.22.73
134.209.22.74 134.209.220.188 134.209.220.63 134.209.220.93
134.209.220.87 134.209.220.242 134.209.220.95 134.209.221.104
118.173.119.152 134.209.221.198 134.209.222.103 134.209.222.114
134.209.222.116 134.209.222.135 134.209.222.142 134.209.222.137