Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Diemen

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.222.242.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.222.242.67.			IN	A

;; AUTHORITY SECTION:
.			158	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020073101 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 01 11:05:45 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 67.242.222.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.242.222.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.75.156.247 attackbots
Mar 12 16:13:39 lnxded63 sshd[1152]: Failed password for root from 218.75.156.247 port 38942 ssh2
Mar 12 16:18:35 lnxded63 sshd[1571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.156.247
Mar 12 16:18:38 lnxded63 sshd[1571]: Failed password for invalid user sammy from 218.75.156.247 port 54136 ssh2
2020-03-13 00:52:44
42.115.220.164 attackspam
Automatic report - Port Scan Attack
2020-03-13 00:58:12
49.234.23.248 attack
2020-03-12 13:34:30,426 fail2ban.actions: WARNING [ssh] Ban 49.234.23.248
2020-03-13 00:50:07
207.180.252.89 attackspambots
Mar 12 16:14:46 takio sshd[21340]: Invalid user kemikaalit from 207.180.252.89 port 49046
Mar 12 16:18:23 takio sshd[21385]: Invalid user user from 207.180.252.89 port 47488
Mar 12 16:21:51 takio sshd[21424]: Invalid user kemikaalit from 207.180.252.89 port 46080
2020-03-13 00:40:11
118.172.201.204 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 00:53:50
84.174.233.238 attack
2020-01-27T05:06:41.615Z CLOSE host=84.174.233.238 port=48604 fd=4 time=20.028 bytes=25
...
2020-03-13 00:51:11
106.75.240.180 attack
Mar 12 23:37:21 lcl-usvr-02 sshd[7178]: Invalid user user13 from 106.75.240.180 port 56118
Mar 12 23:37:21 lcl-usvr-02 sshd[7178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.240.180
Mar 12 23:37:21 lcl-usvr-02 sshd[7178]: Invalid user user13 from 106.75.240.180 port 56118
Mar 12 23:37:23 lcl-usvr-02 sshd[7178]: Failed password for invalid user user13 from 106.75.240.180 port 56118 ssh2
Mar 12 23:46:24 lcl-usvr-02 sshd[7289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.240.180  user=root
Mar 12 23:46:26 lcl-usvr-02 sshd[7289]: Failed password for root from 106.75.240.180 port 59030 ssh2
...
2020-03-13 00:56:11
112.171.60.193 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 00:38:02
217.112.142.59 attackbotsspam
Mar 12 14:11:23 mail.srvfarm.net postfix/smtpd[1830684]: NOQUEUE: reject: RCPT from unknown[217.112.142.59]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:12:20 mail.srvfarm.net postfix/smtpd[1848579]: NOQUEUE: reject: RCPT from unknown[217.112.142.59]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:12:39 mail.srvfarm.net postfix/smtpd[1832121]: NOQUEUE: reject: RCPT from unknown[217.112.142.59]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 14:12:39 mail.srvfarm.net postfix/smtpd[1830684]: NOQUEUE: reject: RCPT from unknown[217.112.142.59]: 450 4.1.8 : S
2020-03-13 00:15:28
80.254.102.117 attackbotsspam
firewall-block, port(s): 445/tcp
2020-03-13 00:42:13
2607:5300:203:2be:: attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-03-13 00:33:19
122.51.171.149 attack
Mar 12 15:50:21 silence02 sshd[28046]: Failed password for root from 122.51.171.149 port 40566 ssh2
Mar 12 15:56:47 silence02 sshd[30753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.171.149
Mar 12 15:56:49 silence02 sshd[30753]: Failed password for invalid user cpanel from 122.51.171.149 port 58552 ssh2
2020-03-13 00:53:26
1.53.27.225 attackspambots
Unauthorized connection attempt from IP address 1.53.27.225 on Port 445(SMB)
2020-03-13 00:45:21
206.214.2.70 attackbotsspam
"IMAP brute force auth login attempt."
2020-03-13 00:46:07
83.97.20.47 attackspambots
2019-10-23T16:51:24.026Z CLOSE host=83.97.20.47 port=13418 fd=4 time=30.011 bytes=28
...
2020-03-13 00:52:00

Recently Reported IPs

155.6.128.57 188.123.10.70 144.23.213.254 33.240.68.242
105.120.116.222 102.236.187.66 89.146.36.151 20.88.142.71
157.121.224.110 151.47.122.36 217.77.239.34 147.243.141.151
150.77.223.155 92.226.141.56 103.79.185.156 62.151.198.204
57.42.139.211 41.156.29.166 150.123.138.79 35.91.252.168