Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: TDS TELECOM

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.215.105.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34792
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.215.105.195.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062500 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 25 15:22:01 CST 2019
;; MSG SIZE  rcvd: 119
Host info
195.105.215.134.in-addr.arpa domain name pointer h134-215-105-195.134-215.unk.tds.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
195.105.215.134.in-addr.arpa	name = h134-215-105-195.134-215.unk.tds.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.232.193 attackbots
Aug 31 04:06:22 instance-2 sshd[1695]: Failed password for root from 106.13.232.193 port 54298 ssh2
Aug 31 04:10:34 instance-2 sshd[1778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.193 
Aug 31 04:10:35 instance-2 sshd[1778]: Failed password for invalid user hanwei from 106.13.232.193 port 51086 ssh2
2020-08-31 15:38:39
184.168.152.124 attack
Brute Force
2020-08-31 15:21:40
142.93.158.170 attackbots
trying to access non-authorized port
2020-08-31 15:02:05
217.182.77.186 attack
Aug 31 07:33:38 [host] sshd[10692]: Invalid user d
Aug 31 07:33:38 [host] sshd[10692]: pam_unix(sshd:
Aug 31 07:33:40 [host] sshd[10692]: Failed passwor
2020-08-31 15:20:13
141.98.81.194 attack
srv02 SSH BruteForce Attacks 22 ..
2020-08-31 15:18:56
93.115.1.195 attack
Port Scan
...
2020-08-31 15:39:43
143.255.198.242 attackspam
400 BAD REQUEST
2020-08-31 15:09:17
114.33.115.145 attackspambots
Automatic report - Port Scan Attack
2020-08-31 15:24:31
164.90.225.105 attackspam
xmlrpc attack
2020-08-31 15:20:37
106.13.141.110 attackbots
Brute-force attempt banned
2020-08-31 15:43:53
162.142.125.40 attackspam
Automatic report - Banned IP Access
2020-08-31 15:06:27
189.244.114.6 attackspam
(sshd) Failed SSH login from 189.244.114.6 (MX/Mexico/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 31 02:44:09 server2 sshd[1046]: Invalid user magno from 189.244.114.6
Aug 31 02:44:09 server2 sshd[1046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.244.114.6 
Aug 31 02:44:11 server2 sshd[1046]: Failed password for invalid user magno from 189.244.114.6 port 24504 ssh2
Aug 31 02:49:50 server2 sshd[5297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.244.114.6  user=root
Aug 31 02:49:52 server2 sshd[5297]: Failed password for root from 189.244.114.6 port 45606 ssh2
2020-08-31 15:42:08
45.182.136.136 attackspambots
Automatic report - Port Scan Attack
2020-08-31 15:12:37
176.102.215.20 attackbots
1598846083 - 08/31/2020 05:54:43 Host: 176.102.215.20/176.102.215.20 Port: 445 TCP Blocked
2020-08-31 15:24:02
103.58.117.244 attackspam
(smtpauth) Failed SMTP AUTH login from 103.58.117.244 (IN/India/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-31 08:24:32 plain authenticator failed for ([103.58.117.244]) [103.58.117.244]: 535 Incorrect authentication data (set_id=h.sabet@iwnt.ir)
2020-08-31 15:31:03

Recently Reported IPs

133.83.169.239 103.44.27.58 213.107.252.251 229.89.12.162
134.119.194.101 140.207.145.59 165.22.3.15 15.1.93.30
63.183.218.128 247.213.148.80 198.90.167.113 150.117.82.116
221.229.166.86 186.232.15.35 166.173.137.106 253.192.19.1
157.126.104.174 35.206.140.225 115.29.88.110 37.70.141.18