Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.249.158.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.249.158.159.		IN	A

;; AUTHORITY SECTION:
.			309	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:42:39 CST 2022
;; MSG SIZE  rcvd: 108
Host info
159.158.249.134.in-addr.arpa domain name pointer 134-249-158-159.broadband.kyivstar.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.158.249.134.in-addr.arpa	name = 134-249-158-159.broadband.kyivstar.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.172 attackspam
Jan 31 00:19:26 tuxlinux sshd[29406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
...
2020-01-31 07:27:01
186.91.237.62 attackspambots
DATE:2020-01-30 22:37:01, IP:186.91.237.62, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-01-31 07:50:49
89.248.160.193 attackspambots
Multiport scan : 78 ports scanned 10004 10036 10052 10054 10086 10102 10117 10203 10236 10243 10252 10264 10280 10315 10342 10350 10363 10364 10369 10370 10374 10380 10384 10396 10406 10412 10441 10450 10460 10461 10474 10493 10530 10541 10574 10590 10606 10612 10638 10674 10695 10699 10727 10752 10759 10768 10835 10851 10861 10867 10877 10910 11106 11113 11131 11177 11196 11204 11209 11212 11240 11241 11254 11263 11286 11293 11295 .....
2020-01-31 07:14:32
188.14.250.112 attackspambots
Jan 30 22:38:22 lnxded64 sshd[9819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.14.250.112
2020-01-31 07:17:49
79.175.133.118 attack
2020-1-31 12:10:06 AM: failed ssh attempt
2020-01-31 07:25:19
197.51.122.21 attackspambots
Unauthorized connection attempt detected from IP address 197.51.122.21 to port 23 [J]
2020-01-31 07:33:27
112.85.42.181 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-01-31 07:46:20
167.60.85.79 attackspambots
Honeypot attack, port: 81, PTR: r167-60-85-79.dialup.adsl.anteldata.net.uy.
2020-01-31 07:38:48
51.178.16.227 attackbots
Unauthorized connection attempt detected from IP address 51.178.16.227 to port 2220 [J]
2020-01-31 07:18:45
94.217.203.82 attackbotsspam
Invalid user kavan from 94.217.203.82 port 42372
2020-01-31 07:54:18
131.72.48.242 attackbots
Honeypot attack, port: 445, PTR: bjnet-48.242.dynamic.bjnet.com.br.
2020-01-31 07:21:08
81.22.45.104 attackspambots
Unauthorised access (Jan 31) SRC=81.22.45.104 LEN=40 TTL=249 ID=19179 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Jan 29) SRC=81.22.45.104 LEN=40 TTL=249 ID=20381 TCP DPT=3389 WINDOW=1024 SYN
2020-01-31 07:34:00
67.227.152.142 attack
Unauthorized connection attempt detected from IP address 67.227.152.142 to port 8545 [J]
2020-01-31 07:18:22
217.182.252.63 attackbotsspam
Unauthorized connection attempt detected from IP address 217.182.252.63 to port 2220 [J]
2020-01-31 07:23:25
27.64.207.228 attack
Automatic report - Port Scan Attack
2020-01-31 07:19:05

Recently Reported IPs

134.249.199.175 134.249.199.90 134.249.216.244 134.249.199.217
134.249.216.78 134.250.252.100 134.255.205.199 134.255.186.34
134.25.4.140 134.255.217.78 134.255.244.2 134.29.1.130
134.29.182.42 134.28.211.5 134.28.209.8 134.35.1.39
134.34.247.9 134.35.10.93 134.29.211.147 134.35.120.236