Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: Nordrhein-Westfalen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.61.195.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.61.195.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 09:03:15 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 52.195.61.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.195.61.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.203.107 attackspambots
Sep 16 02:09:21 amida sshd[727570]: Failed password for r.r from 91.121.203.107 port 34048 ssh2
Sep 16 02:09:21 amida sshd[727570]: Received disconnect from 91.121.203.107: 11: Bye Bye [preauth]
Sep 16 02:25:35 amida sshd[731416]: Failed password for r.r from 91.121.203.107 port 58228 ssh2
Sep 16 02:25:36 amida sshd[731416]: Received disconnect from 91.121.203.107: 11: Bye Bye [preauth]
Sep 16 02:36:08 amida sshd[733752]: Invalid user airaghi from 91.121.203.107
Sep 16 02:36:09 amida sshd[733752]: Failed password for invalid user airaghi from 91.121.203.107 port 43444 ssh2
Sep 16 02:36:09 amida sshd[733752]: Received disconnect from 91.121.203.107: 11: Bye Bye [preauth]
Sep 16 02:46:28 amida sshd[735926]: Invalid user tomcat from 91.121.203.107
Sep 16 02:46:30 amida sshd[735926]: Failed password for invalid user tomcat from 91.121.203.107 port 56920 ssh2
Sep 16 02:46:30 amida sshd[735926]: Received disconnect from 91.121.203.107: 11: Bye Bye [preauth]
Sep 16 02:56:40 am........
-------------------------------
2019-09-16 19:08:18
183.129.150.2 attackbots
Sep 16 16:15:35 areeb-Workstation sshd[4708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.129.150.2
Sep 16 16:15:37 areeb-Workstation sshd[4708]: Failed password for invalid user user from 183.129.150.2 port 39567 ssh2
...
2019-09-16 18:49:09
222.92.142.226 attackspam
Unauthorized IMAP connection attempt
2019-09-16 17:49:54
92.63.194.47 attack
2019-09-16T09:08:51.132891abusebot-3.cloudsearch.cf sshd\[26455\]: Invalid user admin from 92.63.194.47 port 40816
2019-09-16 17:42:42
58.254.132.239 attack
Sep 16 11:31:42 saschabauer sshd[3536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.239
Sep 16 11:31:44 saschabauer sshd[3536]: Failed password for invalid user powerapp from 58.254.132.239 port 27823 ssh2
2019-09-16 18:21:47
121.204.185.106 attackbots
Sep 16 07:39:26 master sshd[6014]: Failed password for invalid user rootme from 121.204.185.106 port 33054 ssh2
Sep 16 07:58:07 master sshd[6073]: Failed password for invalid user nwes from 121.204.185.106 port 42720 ssh2
Sep 16 08:02:01 master sshd[6387]: Failed password for invalid user acaryatanaya from 121.204.185.106 port 60060 ssh2
Sep 16 08:05:42 master sshd[6397]: Failed password for invalid user ye from 121.204.185.106 port 49159 ssh2
Sep 16 08:09:21 master sshd[6405]: Failed password for invalid user appadmin from 121.204.185.106 port 38262 ssh2
Sep 16 08:13:08 master sshd[6419]: Failed password for invalid user dennis from 121.204.185.106 port 55597 ssh2
Sep 16 08:16:55 master sshd[6442]: Failed password for root from 121.204.185.106 port 44700 ssh2
Sep 16 08:20:46 master sshd[6453]: Failed password for invalid user fs from 121.204.185.106 port 33806 ssh2
Sep 16 08:24:26 master sshd[6463]: Failed password for invalid user oracle from 121.204.185.106 port 51138 ssh2
Sep 16 08:28:14 master sshd[6481]
2019-09-16 17:29:51
158.69.192.147 attackbotsspam
Sep 16 05:18:04 plusreed sshd[22643]: Invalid user xsw2CDE# from 158.69.192.147
...
2019-09-16 17:24:58
188.166.208.131 attackbotsspam
Sep 15 23:46:02 wbs sshd\[19661\]: Invalid user sysadmin from 188.166.208.131
Sep 15 23:46:02 wbs sshd\[19661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131
Sep 15 23:46:05 wbs sshd\[19661\]: Failed password for invalid user sysadmin from 188.166.208.131 port 56130 ssh2
Sep 15 23:51:04 wbs sshd\[20131\]: Invalid user martin from 188.166.208.131
Sep 15 23:51:04 wbs sshd\[20131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131
2019-09-16 18:01:29
99.36.238.25 attack
Unauthorised access (Sep 16) SRC=99.36.238.25 LEN=40 TTL=49 ID=11422 TCP DPT=23 WINDOW=34890 SYN
2019-09-16 17:41:37
165.22.50.65 attackspambots
Sep 16 02:03:27 cp1server sshd[2102]: Invalid user PlcmSpIp from 165.22.50.65
Sep 16 02:03:27 cp1server sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.50.65 
Sep 16 02:03:29 cp1server sshd[2102]: Failed password for invalid user PlcmSpIp from 165.22.50.65 port 36496 ssh2
Sep 16 02:03:29 cp1server sshd[2103]: Received disconnect from 165.22.50.65: 11: Bye Bye
Sep 16 02:24:21 cp1server sshd[4388]: Invalid user ts4 from 165.22.50.65
Sep 16 02:24:22 cp1server sshd[4388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.50.65 
Sep 16 02:24:24 cp1server sshd[4388]: Failed password for invalid user ts4 from 165.22.50.65 port 35378 ssh2
Sep 16 02:24:24 cp1server sshd[4389]: Received disconnect from 165.22.50.65: 11: Bye Bye
Sep 16 02:28:39 cp1server sshd[5062]: Invalid user to from 165.22.50.65
Sep 16 02:28:39 cp1server sshd[5062]: pam_unix(sshd:auth): authentication failur........
-------------------------------
2019-09-16 19:17:05
46.105.244.1 attack
SSH invalid-user multiple login attempts
2019-09-16 18:57:15
88.250.27.37 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/88.250.27.37/ 
 TR - 1H : (32)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TR 
 NAME ASN : ASN9121 
 
 IP : 88.250.27.37 
 
 CIDR : 88.250.0.0/19 
 
 PREFIX COUNT : 4577 
 
 UNIQUE IP COUNT : 6868736 
 
 
 WYKRYTE ATAKI Z ASN9121 :  
  1H - 1 
  3H - 2 
  6H - 5 
 12H - 6 
 24H - 19 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-16 17:58:43
178.128.59.78 attack
Sep 16 11:38:18 MainVPS sshd[8656]: Invalid user ubnt from 178.128.59.78 port 30892
Sep 16 11:38:18 MainVPS sshd[8656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.59.78
Sep 16 11:38:18 MainVPS sshd[8656]: Invalid user ubnt from 178.128.59.78 port 30892
Sep 16 11:38:21 MainVPS sshd[8656]: Failed password for invalid user ubnt from 178.128.59.78 port 30892 ssh2
Sep 16 11:43:58 MainVPS sshd[9133]: Invalid user sergio from 178.128.59.78 port 28304
...
2019-09-16 18:49:49
37.187.6.235 attackbots
Sep 16 06:55:01 debian sshd\[13512\]: Invalid user par0t from 37.187.6.235 port 39792
Sep 16 06:55:01 debian sshd\[13512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.6.235
Sep 16 06:55:03 debian sshd\[13512\]: Failed password for invalid user par0t from 37.187.6.235 port 39792 ssh2
...
2019-09-16 19:01:29
123.17.153.77 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-09-16 19:18:20

Recently Reported IPs

185.39.8.219 2.163.23.217 215.120.202.103 222.72.99.42
39.85.248.213 255.140.188.202 188.77.182.208 93.114.6.138
237.163.98.243 63.216.65.191 217.5.143.132 86.119.38.61
22.152.201.210 38.143.74.244 29.179.176.33 128.130.77.202
97.133.45.133 6.227.238.18 179.142.127.231 127.4.37.90