Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Villeurbanne

Region: Auvergne-Rhône-Alpes

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.214.65.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.214.65.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 15:58:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
139.65.214.134.in-addr.arpa domain name pointer api5500.univ-lyon1.fr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.65.214.134.in-addr.arpa	name = api5500.univ-lyon1.fr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.163.1.66 attack
Oct  5 12:43:52 Tower sshd[4550]: refused connect from 54.37.159.12 (54.37.159.12)
Oct  5 17:02:00 Tower sshd[4550]: Connection from 201.163.1.66 port 45794 on 192.168.10.220 port 22 rdomain ""
Oct  5 17:02:01 Tower sshd[4550]: Failed password for root from 201.163.1.66 port 45794 ssh2
Oct  5 17:02:01 Tower sshd[4550]: Received disconnect from 201.163.1.66 port 45794:11: Bye Bye [preauth]
Oct  5 17:02:01 Tower sshd[4550]: Disconnected from authenticating user root 201.163.1.66 port 45794 [preauth]
2020-10-06 06:07:59
78.87.176.42 attackspam
Email rejected due to spam filtering
2020-10-06 05:51:14
120.227.8.39 attackspambots
Oct  5 21:57:43 raspberrypi sshd[20478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.227.8.39  user=root
Oct  5 21:57:46 raspberrypi sshd[20478]: Failed password for invalid user root from 120.227.8.39 port 35010 ssh2
...
2020-10-06 06:18:19
83.110.206.84 attackbots
 TCP (SYN) 83.110.206.84:57705 -> port 22, len 44
2020-10-06 06:13:56
78.157.42.59 attackbots
IP 78.157.42.59 attacked honeypot on port: 1433 at 10/5/2020 1:56:50 AM
2020-10-06 06:20:56
58.69.58.87 attack
Automatic report - Banned IP Access
2020-10-06 05:56:33
217.117.75.98 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-06 05:57:05
85.105.8.237 attack
Automatic report - Port Scan Attack
2020-10-06 06:08:54
45.185.164.185 attack
Automatic report - Port Scan Attack
2020-10-06 05:55:11
94.182.222.66 attackspam
1433/tcp
[2020-10-04]1pkt
2020-10-06 05:45:01
110.35.80.82 attackbots
2020-10-05T01:18:30.089726hostname sshd[99663]: Failed password for root from 110.35.80.82 port 48126 ssh2
...
2020-10-06 05:44:42
159.65.224.137 attackspam
prod8
...
2020-10-06 06:10:44
96.127.179.156 attackbotsspam
Oct  5 13:37:06 pixelmemory sshd[3488347]: Failed password for root from 96.127.179.156 port 47412 ssh2
Oct  5 13:40:30 pixelmemory sshd[3499099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.127.179.156  user=root
Oct  5 13:40:32 pixelmemory sshd[3499099]: Failed password for root from 96.127.179.156 port 54588 ssh2
Oct  5 13:43:54 pixelmemory sshd[3507140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.127.179.156  user=root
Oct  5 13:43:55 pixelmemory sshd[3507140]: Failed password for root from 96.127.179.156 port 33528 ssh2
...
2020-10-06 05:45:15
218.92.0.138 attack
Tried sshing with brute force.
2020-10-06 05:43:05
49.234.43.127 attack
$f2bV_matches
2020-10-06 05:56:09

Recently Reported IPs

132.1.7.28 30.114.136.136 223.127.38.179 204.17.110.11
220.175.207.1 172.100.65.168 99.201.246.51 142.35.67.248
35.76.126.219 140.71.222.190 154.103.50.231 163.35.149.65
152.134.238.33 28.239.194.142 81.28.14.100 127.79.163.204
154.207.186.135 43.165.52.251 26.189.29.146 178.128.122.9