Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fribourg

Region: Fribourg

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.21.209.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.21.209.148.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092802 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 29 09:39:06 CST 2020
;; MSG SIZE  rcvd: 118
Host info
148.209.21.134.in-addr.arpa domain name pointer wired-dyn-209-148.unifr.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.209.21.134.in-addr.arpa	name = wired-dyn-209-148.unifr.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.99.68.198 attackspambots
SSH Brute-Force attacks
2020-02-23 01:24:55
198.167.140.152 attackspambots
Invalid user storm from 198.167.140.152 port 52827
2020-02-23 01:43:56
93.125.99.77 attackbots
Automatic report - XMLRPC Attack
2020-02-23 01:34:39
202.218.49.3 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-23 01:14:50
36.92.100.109 attack
$f2bV_matches_ltvn
2020-02-23 01:19:23
103.6.196.153 attackbots
Automatic report - XMLRPC Attack
2020-02-23 01:29:09
193.31.40.36 attackspambots
firewall-block, port(s): 389/tcp
2020-02-23 01:43:41
192.241.210.125 attackbots
firewall-block, port(s): 2078/tcp
2020-02-23 01:44:33
222.186.180.223 attackspam
Feb 22 18:04:41 MK-Soft-VM8 sshd[26896]: Failed password for root from 222.186.180.223 port 25500 ssh2
Feb 22 18:04:44 MK-Soft-VM8 sshd[26896]: Failed password for root from 222.186.180.223 port 25500 ssh2
...
2020-02-23 01:05:36
222.186.180.17 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Failed password for root from 222.186.180.17 port 24828 ssh2
Failed password for root from 222.186.180.17 port 24828 ssh2
Failed password for root from 222.186.180.17 port 24828 ssh2
Failed password for root from 222.186.180.17 port 24828 ssh2
2020-02-23 01:10:44
177.170.126.240 attackbots
Feb 22 19:26:35 pkdns2 sshd\[53794\]: Invalid user Administrator from 177.170.126.240Feb 22 19:26:37 pkdns2 sshd\[53794\]: Failed password for invalid user Administrator from 177.170.126.240 port 36082 ssh2Feb 22 19:28:48 pkdns2 sshd\[53850\]: Invalid user admin from 177.170.126.240Feb 22 19:28:50 pkdns2 sshd\[53850\]: Failed password for invalid user admin from 177.170.126.240 port 49074 ssh2Feb 22 19:30:52 pkdns2 sshd\[53955\]: Invalid user husty from 177.170.126.240Feb 22 19:30:54 pkdns2 sshd\[53955\]: Failed password for invalid user husty from 177.170.126.240 port 36327 ssh2
...
2020-02-23 01:42:29
51.75.255.166 attack
Feb 22 18:15:33 silence02 sshd[2298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.255.166
Feb 22 18:15:34 silence02 sshd[2298]: Failed password for invalid user Michelle from 51.75.255.166 port 59198 ssh2
Feb 22 18:18:20 silence02 sshd[2527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.255.166
2020-02-23 01:21:55
117.55.241.3 attackspambots
suspicious action Sat, 22 Feb 2020 13:50:56 -0300
2020-02-23 01:16:49
177.53.186.58 attackspam
Port probing on unauthorized port 4567
2020-02-23 01:14:15
119.167.167.32 attack
Automatic report - Port Scan Attack
2020-02-23 01:27:51

Recently Reported IPs

180.123.70.234 46.158.76.229 218.94.97.24 111.29.225.249
14.161.198.213 2.205.50.83 72.86.173.216 24.211.166.221
37.138.233.98 114.89.206.128 74.45.175.42 114.174.192.193
222.92.205.176 197.105.137.90 107.72.90.55 217.243.131.148
79.81.9.211 208.20.162.139 173.109.186.149 72.111.30.211