Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stuttgart

Region: Baden-Württemberg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.3.49.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46548
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.3.49.231.			IN	A

;; AUTHORITY SECTION:
.			3575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082200 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 22 22:22:51 CST 2019
;; MSG SIZE  rcvd: 116
Host info
231.49.3.134.in-addr.arpa domain name pointer HSI-KBW-134-3-49-231.hsi14.kabel-badenwuerttemberg.de.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
231.49.3.134.in-addr.arpa	name = HSI-KBW-134-3-49-231.hsi14.kabel-badenwuerttemberg.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.55.219.114 attackbots
Invalid user test from 45.55.219.114 port 37558
2020-03-20 04:13:05
111.229.252.207 attack
(sshd) Failed SSH login from 111.229.252.207 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 19 18:48:30 amsweb01 sshd[24760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.252.207  user=root
Mar 19 18:48:32 amsweb01 sshd[24760]: Failed password for root from 111.229.252.207 port 56376 ssh2
Mar 19 18:53:53 amsweb01 sshd[25370]: Invalid user staff from 111.229.252.207 port 42778
Mar 19 18:53:55 amsweb01 sshd[25370]: Failed password for invalid user staff from 111.229.252.207 port 42778 ssh2
Mar 19 18:57:55 amsweb01 sshd[25853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.252.207  user=root
2020-03-20 04:00:51
94.181.94.12 attackbots
Fail2Ban Ban Triggered (2)
2020-03-20 04:05:02
167.114.47.68 attack
DATE:2020-03-19 20:43:04, IP:167.114.47.68, PORT:ssh SSH brute force auth (docker-dc)
2020-03-20 04:24:23
51.91.250.49 attackbots
$f2bV_matches
2020-03-20 04:10:08
77.118.203.60 attack
Invalid user krishna from 77.118.203.60 port 5450
2020-03-20 04:06:43
106.12.220.156 attackbots
Invalid user admin from 106.12.220.156 port 35706
2020-03-20 04:02:24
104.236.244.98 attack
Mar 19 20:54:46 ns3042688 sshd\[2680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.244.98  user=root
Mar 19 20:54:48 ns3042688 sshd\[2680\]: Failed password for root from 104.236.244.98 port 54078 ssh2
Mar 19 21:01:10 ns3042688 sshd\[4122\]: Invalid user dam from 104.236.244.98
Mar 19 21:01:10 ns3042688 sshd\[4122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.244.98 
Mar 19 21:01:12 ns3042688 sshd\[4122\]: Failed password for invalid user dam from 104.236.244.98 port 46030 ssh2
...
2020-03-20 04:03:45
222.186.170.77 attackbots
Mar 19 16:23:01 sd-53420 sshd\[9895\]: Invalid user liuchao from 222.186.170.77
Mar 19 16:23:01 sd-53420 sshd\[9895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.170.77
Mar 19 16:23:03 sd-53420 sshd\[9895\]: Failed password for invalid user liuchao from 222.186.170.77 port 51622 ssh2
Mar 19 16:29:41 sd-53420 sshd\[11893\]: User root from 222.186.170.77 not allowed because none of user's groups are listed in AllowGroups
Mar 19 16:29:41 sd-53420 sshd\[11893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.170.77  user=root
...
2020-03-20 04:17:05
194.156.121.27 attackspam
Invalid user couchdb from 194.156.121.27 port 42570
2020-03-20 04:22:18
106.13.81.162 attackbotsspam
web-1 [ssh] SSH Attack
2020-03-20 04:35:18
152.136.112.18 attackbots
Invalid user postgres from 152.136.112.18 port 45862
2020-03-20 04:25:50
80.211.13.167 attackbotsspam
fail2ban -- 80.211.13.167
...
2020-03-20 04:06:11
91.121.175.61 attack
Invalid user nmrsu from 91.121.175.61 port 59522
2020-03-20 04:37:53
212.204.65.160 attackbots
Unauthorized SSH login attempts
2020-03-20 04:19:00

Recently Reported IPs

45.78.177.32 106.12.177.51 168.24.171.48 192.236.14.101
173.139.103.65 154.25.7.99 178.167.34.124 91.96.135.52
53.24.206.187 88.30.217.33 89.38.145.250 15.29.181.18
150.181.182.211 155.190.235.91 160.4.72.122 122.239.171.57
188.116.181.233 48.17.245.55 42.172.121.24 93.4.176.168