Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.36.21.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.36.21.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 18:06:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 119.21.36.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.21.36.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.84.88.254 attack
Oct  1 04:27:15 w sshd[11038]: Did not receive identification string from 186.84.88.254
Oct  1 04:27:18 w sshd[11039]: Invalid user tech from 186.84.88.254
Oct  1 04:27:19 w sshd[11039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.88.254
Oct  1 04:27:21 w sshd[11039]: Failed password for invalid user tech from 186.84.88.254 port 37074 ssh2
Oct  1 04:27:21 w sshd[11039]: Connection closed by 186.84.88.254 port 37074 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=186.84.88.254
2020-10-01 12:43:20
196.27.127.61 attackspam
Oct  1 sshd[24086]: Invalid user tms from 196.27.127.61 port 57330
2020-10-01 12:25:39
123.6.5.104 attackspam
Oct  1 02:29:36 santamaria sshd\[17437\]: Invalid user admin from 123.6.5.104
Oct  1 02:29:36 santamaria sshd\[17437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.6.5.104
Oct  1 02:29:38 santamaria sshd\[17437\]: Failed password for invalid user admin from 123.6.5.104 port 33362 ssh2
...
2020-10-01 12:49:27
189.129.78.19 attackspambots
WordPress wp-login brute force :: 189.129.78.19 0.060 BYPASS [30/Sep/2020:20:41:44  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2549 "https://[censored_2]/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36"
2020-10-01 12:28:29
106.107.222.10 attack
5555/tcp
[2020-09-30]1pkt
2020-10-01 12:50:03
103.113.32.52 attackbotsspam
Sep 30 22:48:00 vps333114 sshd[10514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.32.52
Sep 30 22:48:02 vps333114 sshd[10514]: Failed password for invalid user administrator from 103.113.32.52 port 62526 ssh2
...
2020-10-01 12:19:13
27.110.164.162 attack
 TCP (SYN) 27.110.164.162:18109 -> port 23, len 44
2020-10-01 12:10:01
118.72.45.0 attackbotsspam
 TCP (SYN) 118.72.45.0:46492 -> port 8080, len 40
2020-10-01 12:18:14
200.56.17.5 attackspam
Oct  1 01:15:47 ws22vmsma01 sshd[176049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.56.17.5
Oct  1 01:15:49 ws22vmsma01 sshd[176049]: Failed password for invalid user fastuser from 200.56.17.5 port 43892 ssh2
...
2020-10-01 12:25:20
182.53.55.190 attackbots
2020-10-01T04:07:18.703310abusebot-2.cloudsearch.cf sshd[9002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=node-b0e.pool-182-53.dynamic.totinternet.net  user=root
2020-10-01T04:07:20.645815abusebot-2.cloudsearch.cf sshd[9002]: Failed password for root from 182.53.55.190 port 38780 ssh2
2020-10-01T04:10:14.870851abusebot-2.cloudsearch.cf sshd[9052]: Invalid user afa from 182.53.55.190 port 51068
2020-10-01T04:10:14.877774abusebot-2.cloudsearch.cf sshd[9052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=node-b0e.pool-182-53.dynamic.totinternet.net
2020-10-01T04:10:14.870851abusebot-2.cloudsearch.cf sshd[9052]: Invalid user afa from 182.53.55.190 port 51068
2020-10-01T04:10:17.317389abusebot-2.cloudsearch.cf sshd[9052]: Failed password for invalid user afa from 182.53.55.190 port 51068 ssh2
2020-10-01T04:13:06.635484abusebot-2.cloudsearch.cf sshd[9114]: pam_unix(sshd:auth): authentication failure; logn
...
2020-10-01 12:38:13
165.22.104.247 attack
2020-09-30T23:42:47.064027yoshi.linuxbox.ninja sshd[802582]: Invalid user kumar from 165.22.104.247 port 47294
2020-09-30T23:42:48.615831yoshi.linuxbox.ninja sshd[802582]: Failed password for invalid user kumar from 165.22.104.247 port 47294 ssh2
2020-09-30T23:47:01.136329yoshi.linuxbox.ninja sshd[805077]: Invalid user VM from 165.22.104.247 port 55566
...
2020-10-01 12:47:45
216.98.211.118 attackbotsspam
445/tcp
[2020-09-30]1pkt
2020-10-01 12:31:25
175.24.81.207 attackbots
Oct  1 01:13:03 email sshd\[24987\]: Invalid user ting from 175.24.81.207
Oct  1 01:13:03 email sshd\[24987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.81.207
Oct  1 01:13:04 email sshd\[24987\]: Failed password for invalid user ting from 175.24.81.207 port 33058 ssh2
Oct  1 01:17:53 email sshd\[25796\]: Invalid user interview from 175.24.81.207
Oct  1 01:17:53 email sshd\[25796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.81.207
...
2020-10-01 12:35:25
34.72.30.48 attackspam
uvcm 34.72.30.48 [28/Sep/2020:18:31:52 "-" "POST /wp-login.php 200 2273
34.72.30.48 [01/Oct/2020:06:46:38 "-" "GET /wp-login.php 200 1549
34.72.30.48 [01/Oct/2020:06:46:39 "-" "POST /wp-login.php 200 1935
2020-10-01 12:19:46
124.105.205.139 attackbots
WordPress wp-login brute force :: 124.105.205.139 0.056 BYPASS [30/Sep/2020:20:41:37  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2549 "https://[censored_2]/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36"
2020-10-01 12:39:41

Recently Reported IPs

146.38.252.61 239.142.47.215 140.36.207.121 168.135.154.70
227.163.197.169 238.212.55.254 101.110.85.56 168.21.250.190
22.17.171.130 249.214.94.79 179.65.162.36 140.11.145.189
203.193.239.236 12.167.197.143 125.189.58.64 66.59.47.91
247.113.187.70 184.86.190.144 162.93.246.5 147.179.193.241