Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.30.127.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21281
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.30.127.91.			IN	A

;; AUTHORITY SECTION:
.			290	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 28 06:57:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
91.127.30.134.in-addr.arpa domain name pointer opc.basisit.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
91.127.30.134.in-addr.arpa	name = opc.basisit.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.130.190.13 attack
Nov  5 17:48:24 ns381471 sshd[8605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.190.13
Nov  5 17:48:26 ns381471 sshd[8605]: Failed password for invalid user Isaac2017 from 220.130.190.13 port 30696 ssh2
2019-11-06 02:18:41
200.194.15.128 attackbotsspam
Automatic report - Port Scan Attack
2019-11-06 02:22:49
188.116.186.130 attackbots
Unauthorised access (Nov  5) SRC=188.116.186.130 LEN=40 TTL=54 ID=39805 TCP DPT=23 WINDOW=12659 SYN
2019-11-06 01:58:51
150.223.28.250 attackspambots
ssh failed login
2019-11-06 02:08:11
103.80.111.86 attackbots
WEB_SERVER 403 Forbidden
2019-11-06 02:08:58
147.78.64.106 attackbots
2019-11-05T15:53:42.582178shield sshd\[6431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.78.64.106  user=root
2019-11-05T15:53:44.544368shield sshd\[6431\]: Failed password for root from 147.78.64.106 port 50226 ssh2
2019-11-05T15:58:21.551695shield sshd\[7026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.78.64.106  user=root
2019-11-05T15:58:23.814992shield sshd\[7026\]: Failed password for root from 147.78.64.106 port 39546 ssh2
2019-11-05T16:02:58.555070shield sshd\[7445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.78.64.106  user=root
2019-11-06 02:25:01
92.118.161.53 attackbotsspam
" "
2019-11-06 01:53:17
157.55.39.20 attackspam
Automatic report - Banned IP Access
2019-11-06 02:16:30
151.74.147.213 attackbots
Automatic report - Port Scan Attack
2019-11-06 01:50:38
201.179.37.91 attackbots
" "
2019-11-06 02:07:28
45.136.109.87 attackbotsspam
11/05/2019-12:04:15.419624 45.136.109.87 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-06 02:30:29
71.87.7.226 attackbotsspam
WEB_SERVER 403 Forbidden
2019-11-06 01:59:50
69.70.65.118 attackbots
$f2bV_matches
2019-11-06 02:18:23
185.156.177.216 attackbotsspam
port scan and connect, tcp 8888 (sun-answerbook)
2019-11-06 02:15:42
93.42.126.148 attackbotsspam
Nov  5 16:45:32 vps691689 sshd[18325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.42.126.148
Nov  5 16:45:35 vps691689 sshd[18325]: Failed password for invalid user aodun!@#$%^ from 93.42.126.148 port 53268 ssh2
...
2019-11-06 02:26:33

Recently Reported IPs

25.9.250.167 134.106.6.159 204.204.125.86 39.113.185.14
185.73.158.50 230.183.82.191 249.87.63.51 239.170.43.240
87.63.62.208 173.220.71.218 82.1.109.171 180.94.131.51
60.133.21.131 32.52.197.227 233.59.180.141 249.248.39.222
75.204.12.55 43.88.171.190 237.172.186.173 206.212.126.119