Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.222.140.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.222.140.188.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 23:31:26 CST 2025
;; MSG SIZE  rcvd: 108
Host info
188.140.222.134.in-addr.arpa domain name pointer zvtm-s1-rou-1043.BE.as286.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
188.140.222.134.in-addr.arpa	name = zvtm-s1-rou-1043.BE.as286.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.193.240.202 attack
445/tcp
[2019-07-19]1pkt
2019-07-20 05:19:28
206.201.5.44 attackbotsspam
8291/tcp 8291/tcp
[2019-07-19]2pkt
2019-07-20 05:44:59
93.42.117.137 attackspambots
Jul 19 22:59:46 minden010 sshd[6130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.42.117.137
Jul 19 22:59:48 minden010 sshd[6130]: Failed password for invalid user csserver from 93.42.117.137 port 48023 ssh2
Jul 19 23:05:17 minden010 sshd[8101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.42.117.137
...
2019-07-20 05:29:24
202.51.110.214 attack
Jul 19 23:07:05 minden010 sshd[8826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
Jul 19 23:07:07 minden010 sshd[8826]: Failed password for invalid user liu from 202.51.110.214 port 35259 ssh2
Jul 19 23:13:01 minden010 sshd[10952]: Failed password for root from 202.51.110.214 port 60919 ssh2
...
2019-07-20 05:56:02
220.166.248.13 attackbots
2323/tcp
[2019-07-19]1pkt
2019-07-20 05:22:28
218.92.1.142 attackspam
Jul 19 17:45:21 TORMINT sshd\[10219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
Jul 19 17:45:24 TORMINT sshd\[10219\]: Failed password for root from 218.92.1.142 port 61826 ssh2
Jul 19 17:46:30 TORMINT sshd\[10233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
...
2019-07-20 05:58:40
106.248.41.245 attackbotsspam
2019-07-19T18:20:01.946019abusebot-6.cloudsearch.cf sshd\[15358\]: Invalid user jin from 106.248.41.245 port 42992
2019-07-20 05:48:30
190.38.188.109 attack
445/tcp
[2019-07-19]1pkt
2019-07-20 05:29:01
139.59.34.164 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-20 05:40:02
185.131.62.244 attackbotsspam
Brute force SMTP login attempts.
2019-07-20 05:59:58
104.236.30.168 attack
Jul 19 22:56:42 MK-Soft-Root1 sshd\[13190\]: Invalid user uno85 from 104.236.30.168 port 43572
Jul 19 22:56:42 MK-Soft-Root1 sshd\[13190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.30.168
Jul 19 22:56:44 MK-Soft-Root1 sshd\[13190\]: Failed password for invalid user uno85 from 104.236.30.168 port 43572 ssh2
...
2019-07-20 05:42:46
42.202.36.193 attack
Automatic report generated by Wazuh
2019-07-20 05:21:20
1.169.208.226 attack
23/tcp
[2019-07-19]1pkt
2019-07-20 05:22:08
171.5.90.225 attackspam
5555/tcp
[2019-07-19]1pkt
2019-07-20 05:51:55
118.70.151.60 attack
23/tcp
[2019-07-19]1pkt
2019-07-20 05:31:13

Recently Reported IPs

54.109.63.156 29.25.200.162 71.194.183.7 167.41.86.186
83.106.239.77 166.122.0.184 212.54.10.113 230.169.139.36
5.137.215.70 23.66.233.153 152.103.48.211 170.236.246.167
134.170.134.222 209.107.122.201 2.221.55.116 160.61.63.211
172.124.47.210 50.66.189.250 44.154.97.31 4.84.99.156