Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stafford

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.220.149.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.220.149.120.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 08:37:17 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 120.149.220.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.149.220.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.119.160.146 attackspam
09/25/2019-19:05:56.392055 92.119.160.146 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-26 07:14:18
187.167.193.230 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-26 06:51:48
111.231.203.94 attack
Sep 25 17:58:20 aat-srv002 sshd[22352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.203.94
Sep 25 17:58:22 aat-srv002 sshd[22352]: Failed password for invalid user adelia from 111.231.203.94 port 49962 ssh2
Sep 25 18:02:33 aat-srv002 sshd[22433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.203.94
Sep 25 18:02:35 aat-srv002 sshd[22433]: Failed password for invalid user lasg from 111.231.203.94 port 55374 ssh2
...
2019-09-26 07:05:58
150.95.54.138 attackspambots
Looking for resource vulnerabilities
2019-09-26 06:51:16
192.227.252.23 attackbotsspam
Sep 26 00:11:38 vps01 sshd[27188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.23
Sep 26 00:11:39 vps01 sshd[27188]: Failed password for invalid user passwd from 192.227.252.23 port 43734 ssh2
2019-09-26 07:10:35
222.186.175.182 attackbotsspam
Sep 26 04:31:03 areeb-Workstation sshd[12557]: Failed password for root from 222.186.175.182 port 45224 ssh2
Sep 26 04:31:20 areeb-Workstation sshd[12557]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 45224 ssh2 [preauth]
...
2019-09-26 07:07:51
197.248.205.53 attackspambots
Sep 25 12:59:32 hiderm sshd\[15032\]: Invalid user tgz from 197.248.205.53
Sep 25 12:59:32 hiderm sshd\[15032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.205.53
Sep 25 12:59:33 hiderm sshd\[15032\]: Failed password for invalid user tgz from 197.248.205.53 port 54854 ssh2
Sep 25 13:04:13 hiderm sshd\[15368\]: Invalid user admin from 197.248.205.53
Sep 25 13:04:13 hiderm sshd\[15368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.205.53
2019-09-26 07:19:57
185.176.27.18 attack
09/26/2019-00:53:38.391911 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-26 07:23:46
222.186.175.148 attackbotsspam
Sep 26 01:07:40 rotator sshd\[2348\]: Failed password for root from 222.186.175.148 port 52208 ssh2Sep 26 01:07:44 rotator sshd\[2348\]: Failed password for root from 222.186.175.148 port 52208 ssh2Sep 26 01:07:48 rotator sshd\[2348\]: Failed password for root from 222.186.175.148 port 52208 ssh2Sep 26 01:07:52 rotator sshd\[2348\]: Failed password for root from 222.186.175.148 port 52208 ssh2Sep 26 01:07:56 rotator sshd\[2348\]: Failed password for root from 222.186.175.148 port 52208 ssh2Sep 26 01:08:07 rotator sshd\[2353\]: Failed password for root from 222.186.175.148 port 60174 ssh2
...
2019-09-26 07:13:00
157.230.153.203 attackbots
Automatic report - Banned IP Access
2019-09-26 07:13:14
222.186.175.169 attackspam
Sep 25 18:32:05 xtremcommunity sshd\[469705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Sep 25 18:32:07 xtremcommunity sshd\[469705\]: Failed password for root from 222.186.175.169 port 49730 ssh2
Sep 25 18:32:11 xtremcommunity sshd\[469705\]: Failed password for root from 222.186.175.169 port 49730 ssh2
Sep 25 18:32:15 xtremcommunity sshd\[469705\]: Failed password for root from 222.186.175.169 port 49730 ssh2
Sep 25 18:32:20 xtremcommunity sshd\[469705\]: Failed password for root from 222.186.175.169 port 49730 ssh2
...
2019-09-26 07:01:24
157.245.106.178 attackbotsspam
RDP Bruteforce
2019-09-26 06:59:53
124.66.13.99 attackspam
SSH invalid-user multiple login try
2019-09-26 07:15:35
192.144.151.30 attackbotsspam
Sep 25 22:54:42 lnxded64 sshd[28990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.151.30
2019-09-26 07:22:56
176.79.13.126 attackspam
Sep 25 23:02:05 hcbbdb sshd\[19628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl-13-126.bl27.telepac.pt  user=root
Sep 25 23:02:06 hcbbdb sshd\[19628\]: Failed password for root from 176.79.13.126 port 41661 ssh2
Sep 25 23:06:51 hcbbdb sshd\[20116\]: Invalid user server from 176.79.13.126
Sep 25 23:06:51 hcbbdb sshd\[20116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl-13-126.bl27.telepac.pt
Sep 25 23:06:53 hcbbdb sshd\[20116\]: Failed password for invalid user server from 176.79.13.126 port 37215 ssh2
2019-09-26 07:16:37

Recently Reported IPs

173.23.180.235 202.48.195.72 52.71.77.174 190.158.220.110
203.229.91.236 243.207.241.124 187.57.170.206 213.14.219.56
27.31.75.221 38.82.71.226 84.123.95.198 160.206.97.138
214.5.230.240 21.95.208.127 194.96.236.76 55.185.179.233
142.245.184.244 131.20.62.247 15.49.121.19 128.179.32.213