Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.42.31.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.42.31.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:52:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 105.31.42.134.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 134.42.31.105.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
123.206.100.165 attack
LAV,DEF GET /MyAdmin/scripts/setup.php
2019-11-23 22:06:29
125.162.73.17 attackspambots
" "
2019-11-23 21:46:07
118.24.99.163 attackspambots
Nov 23 14:05:36 icinga sshd[52617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.99.163 
Nov 23 14:05:37 icinga sshd[52617]: Failed password for invalid user robert from 118.24.99.163 port 42223 ssh2
Nov 23 14:14:18 icinga sshd[60528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.99.163 
...
2019-11-23 21:55:11
37.187.54.67 attackbots
Nov 23 08:05:34 dedicated sshd[27329]: Invalid user web from 37.187.54.67 port 39044
2019-11-23 21:48:12
45.55.67.128 attack
2019-11-23T13:32:07.622981shield sshd\[25300\]: Invalid user  from 45.55.67.128 port 58690
2019-11-23T13:32:07.627079shield sshd\[25300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.67.128
2019-11-23T13:32:09.911823shield sshd\[25300\]: Failed password for invalid user  from 45.55.67.128 port 58690 ssh2
2019-11-23T13:36:41.165989shield sshd\[26729\]: Invalid user password123 from 45.55.67.128 port 48045
2019-11-23T13:36:41.170203shield sshd\[26729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.67.128
2019-11-23 21:46:32
1.170.84.75 attackspam
Hits on port : 5555
2019-11-23 21:41:10
54.176.188.51 attack
ENG,WP GET /blog/wp-login.php
GET /wordpress/wp-login.php
GET /wp-login.php
2019-11-23 21:52:10
191.54.165.130 attackspambots
Invalid user support from 191.54.165.130 port 59881
2019-11-23 22:10:10
61.187.241.254 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-23 21:31:08
141.136.44.11 attack
$f2bV_matches
2019-11-23 21:57:28
159.65.138.146 attack
Nov 23 14:36:05 vps691689 sshd[17557]: Failed password for root from 159.65.138.146 port 32974 ssh2
Nov 23 14:38:17 vps691689 sshd[17589]: Failed password for root from 159.65.138.146 port 49741 ssh2
...
2019-11-23 21:49:35
114.106.150.198 attackbotsspam
/download/file.php?id=160&sid=173620f71161811c4fd91df279cfaf8c
2019-11-23 21:59:37
150.223.27.66 attackbotsspam
Invalid user engelstad from 150.223.27.66 port 39618
2019-11-23 22:16:46
178.134.203.247 attackbotsspam
RDP Brute-Force (Grieskirchen RZ2)
2019-11-23 22:05:18
58.249.123.38 attackbotsspam
Nov 23 10:00:49 ns41 sshd[23553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.123.38
2019-11-23 21:38:22

Recently Reported IPs

237.236.74.250 109.148.164.38 17.30.93.233 202.44.163.124
58.179.14.246 214.225.165.15 82.254.54.201 201.58.173.154
81.232.245.166 224.86.64.76 242.106.124.62 101.31.23.12
61.212.172.50 84.193.166.224 159.9.13.240 218.14.37.151
145.61.91.11 163.3.109.59 253.115.52.126 223.178.93.146