Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.218.243.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.218.243.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:03:22 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 149.243.218.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.243.218.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.132.13.206 attack
Jul 11 05:40:35 nas sshd[29691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.206 
Jul 11 05:40:37 nas sshd[29691]: Failed password for invalid user rosemary from 120.132.13.206 port 48638 ssh2
Jul 11 05:53:46 nas sshd[30224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.206 
...
2020-07-11 15:38:51
39.89.216.160 attack
1594439602 - 07/11/2020 05:53:22 Host: 39.89.216.160/39.89.216.160 Port: 23 TCP Blocked
2020-07-11 15:59:02
54.37.235.195 attackspam
Jul 10 02:15:03 ns sshd[28880]: Connection from 54.37.235.195 port 44404 on 134.119.39.98 port 22
Jul 10 02:15:03 ns sshd[28880]: Invalid user stepan from 54.37.235.195 port 44404
Jul 10 02:15:03 ns sshd[28880]: Failed password for invalid user stepan from 54.37.235.195 port 44404 ssh2
Jul 10 02:15:03 ns sshd[28880]: Received disconnect from 54.37.235.195 port 44404:11: Bye Bye [preauth]
Jul 10 02:15:03 ns sshd[28880]: Disconnected from 54.37.235.195 port 44404 [preauth]
Jul 10 02:34:48 ns sshd[23052]: Connection from 54.37.235.195 port 39136 on 134.119.39.98 port 22
Jul 10 02:34:53 ns sshd[23052]: Invalid user dexter from 54.37.235.195 port 39136
Jul 10 02:34:53 ns sshd[23052]: Failed password for invalid user dexter from 54.37.235.195 port 39136 ssh2
Jul 10 02:34:53 ns sshd[23052]: Received disconnect from 54.37.235.195 port 39136:11: Bye Bye [preauth]
Jul 10 02:34:53 ns sshd[23052]: Disconnected from 54.37.235.195 port 39136 [preauth]
Jul 10 02:40:44 ns sshd[27915]: ........
-------------------------------
2020-07-11 16:08:07
187.120.135.132 attack
failed_logins
2020-07-11 16:07:05
115.79.192.93 attackspambots
trying to access non-authorized port
2020-07-11 16:02:25
175.176.91.95 attackbotsspam
Unauthorised access (Jul 11) SRC=175.176.91.95 LEN=52 PREC=0x20 TTL=114 ID=22687 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-11 15:32:55
192.35.168.238 attack
07/10/2020-23:53:12.167835 192.35.168.238 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-11 16:08:31
128.199.177.224 attack
$f2bV_matches
2020-07-11 15:29:06
106.13.167.3 attackbots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-11 15:34:11
185.53.88.221 attack
[2020-07-11 01:19:35] NOTICE[1150][C-00001cf2] chan_sip.c: Call from '' (185.53.88.221:5070) to extension '972595897084' rejected because extension not found in context 'public'.
[2020-07-11 01:19:35] SECURITY[1167] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-11T01:19:35.028-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="972595897084",SessionID="0x7fcb4c2700b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.221/5070",ACLName="no_extension_match"
[2020-07-11 01:25:59] NOTICE[1150][C-00001cf7] chan_sip.c: Call from '' (185.53.88.221:5070) to extension '011972595897084' rejected because extension not found in context 'public'.
[2020-07-11 01:25:59] SECURITY[1167] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-11T01:25:59.669-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972595897084",SessionID="0x7fcb4c39d6d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88
...
2020-07-11 15:30:30
42.123.99.67 attackspam
SSH invalid-user multiple login attempts
2020-07-11 15:42:09
112.85.42.172 attackbots
2020-07-11T10:00:48.432036snf-827550 sshd[20979]: Failed password for root from 112.85.42.172 port 50257 ssh2
2020-07-11T10:00:51.649331snf-827550 sshd[20979]: Failed password for root from 112.85.42.172 port 50257 ssh2
2020-07-11T10:00:54.983758snf-827550 sshd[20979]: Failed password for root from 112.85.42.172 port 50257 ssh2
...
2020-07-11 15:31:21
165.3.86.58 attackbotsspam
2020-07-11T05:53:34.088577+02:00 lumpi kernel: [19729250.792474] INPUT:DROP:SPAMHAUS_DROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=165.3.86.58 DST=78.46.199.189 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=18721 DF PROTO=TCP SPT=31506 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
...
2020-07-11 15:50:13
51.38.190.237 attackspam
Automatic report - Banned IP Access
2020-07-11 15:48:20
118.89.153.96 attackspam
Jul 11 01:02:30 Host-KLAX-C sshd[22455]: Disconnected from invalid user lareina 118.89.153.96 port 59970 [preauth]
...
2020-07-11 15:45:28

Recently Reported IPs

169.218.200.219 184.44.221.82 209.17.72.91 153.185.241.39
247.130.154.149 153.123.144.73 242.85.157.208 210.106.244.233
148.32.159.25 176.217.13.89 224.76.177.249 115.163.158.248
186.135.177.162 167.205.40.73 57.178.199.134 195.127.15.125
103.161.63.114 40.244.223.204 24.120.59.115 160.198.76.204