Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nürnberg

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.213.214.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52026
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.213.214.63.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122700 1800 900 604800 86400

;; Query time: 153 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 27 20:31:49 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 63.214.213.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 63.214.213.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.250.219.33 attackspambots
SSH invalid-user multiple login try
2020-07-10 06:02:37
186.136.35.204 attackbots
Jul  9 18:21:45 firewall sshd[31690]: Invalid user rungsit.ato from 186.136.35.204
Jul  9 18:21:47 firewall sshd[31690]: Failed password for invalid user rungsit.ato from 186.136.35.204 port 38630 ssh2
Jul  9 18:25:51 firewall sshd[31779]: Invalid user linjk from 186.136.35.204
...
2020-07-10 05:48:41
138.68.40.92 attackbotsspam
Jul  9 22:42:56 rocket sshd[28424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.40.92
Jul  9 22:42:58 rocket sshd[28424]: Failed password for invalid user nishida from 138.68.40.92 port 57294 ssh2
...
2020-07-10 05:54:15
120.79.241.142 attack
Jul  9 22:08:08 xeon sshd[40185]: Failed password for invalid user test from 120.79.241.142 port 36664 ssh2
2020-07-10 06:09:04
1.61.40.26 attackspambots
firewall-block, port(s): 37215/tcp
2020-07-10 06:09:52
91.245.129.71 attackspambots
firewall-block, port(s): 445/tcp
2020-07-10 06:03:33
106.13.86.54 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-10 06:11:42
106.12.57.149 attackspam
firewall-block, port(s): 30785/tcp
2020-07-10 05:59:25
222.186.52.86 attackspambots
2020-07-09T21:21:57.263969server.espacesoutien.com sshd[10225]: Failed password for root from 222.186.52.86 port 34048 ssh2
2020-07-09T21:21:59.428240server.espacesoutien.com sshd[10225]: Failed password for root from 222.186.52.86 port 34048 ssh2
2020-07-09T21:23:06.135832server.espacesoutien.com sshd[10308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.86  user=root
2020-07-09T21:23:08.170478server.espacesoutien.com sshd[10308]: Failed password for root from 222.186.52.86 port 11291 ssh2
...
2020-07-10 06:10:06
222.186.180.130 attack
Jul  9 15:16:34 dignus sshd[7853]: Failed password for root from 222.186.180.130 port 23502 ssh2
Jul  9 15:16:37 dignus sshd[7853]: Failed password for root from 222.186.180.130 port 23502 ssh2
Jul  9 15:16:39 dignus sshd[7853]: Failed password for root from 222.186.180.130 port 23502 ssh2
Jul  9 15:16:41 dignus sshd[7869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Jul  9 15:16:43 dignus sshd[7869]: Failed password for root from 222.186.180.130 port 41833 ssh2
...
2020-07-10 06:18:28
115.159.153.180 attack
SSH invalid-user multiple login try
2020-07-10 06:09:24
187.176.185.65 attackbotsspam
SSH Invalid Login
2020-07-10 05:56:39
159.65.5.164 attackbots
Jul  9 23:18:17 master sshd[29016]: Failed password for invalid user wenbo from 159.65.5.164 port 51632 ssh2
2020-07-10 05:49:31
193.70.89.69 attackbots
2020-07-09T22:25:32+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-07-10 05:51:06
114.24.232.228 attackspam
Attempted connection to port 23.
2020-07-10 05:57:44

Recently Reported IPs

140.23.160.254 134.21.222.171 130.16.33.232 132.191.27.5
125.101.73.99 181.159.205.107 11.105.212.179 108.15.69.151
105.52.2.119 102.62.111.66 101.193.149.125 0.118.102.23
149.123.143.163 20.205.243.166 42.9.111.80 95.254.110.21
99.39.183.26 92.183.60.144 90.50.53.122 90.124.201.124