Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.67.21.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.67.21.55.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:43:02 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 55.21.67.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.21.67.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.235.82.68 attack
Nov 13 17:20:36 localhost sshd\[1971\]: Invalid user r00t12345678 from 148.235.82.68 port 36598
Nov 13 17:20:36 localhost sshd\[1971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.82.68
Nov 13 17:20:38 localhost sshd\[1971\]: Failed password for invalid user r00t12345678 from 148.235.82.68 port 36598 ssh2
2019-11-14 02:48:35
220.134.144.96 attack
Nov 13 21:50:46 vibhu-HP-Z238-Microtower-Workstation sshd\[717\]: Invalid user test1 from 220.134.144.96
Nov 13 21:50:46 vibhu-HP-Z238-Microtower-Workstation sshd\[717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.144.96
Nov 13 21:50:48 vibhu-HP-Z238-Microtower-Workstation sshd\[717\]: Failed password for invalid user test1 from 220.134.144.96 port 39540 ssh2
Nov 13 21:54:43 vibhu-HP-Z238-Microtower-Workstation sshd\[938\]: Invalid user neufeld from 220.134.144.96
Nov 13 21:54:43 vibhu-HP-Z238-Microtower-Workstation sshd\[938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.144.96
...
2019-11-14 02:50:13
112.29.140.222 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:46:58
184.154.216.246 attackbots
Automatic report - XMLRPC Attack
2019-11-14 02:35:59
63.88.23.167 attackspambots
63.88.23.167 was recorded 7 times by 3 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 7, 23, 52
2019-11-14 02:49:57
41.242.111.230 attack
11/13/2019-09:48:13.153092 41.242.111.230 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-14 02:06:23
167.99.158.136 attackspam
Nov 13 16:50:42 MK-Soft-VM6 sshd[30588]: Failed password for mysql from 167.99.158.136 port 45644 ssh2
...
2019-11-14 02:28:32
52.34.253.52 attack
2019-11-13 16:06:13 H=smtp33b.mxver.com [52.34.253.52] F= rejected RCPT : relay not permitted
2019-11-13 16:28:15 H=smtp33b.mxver.com [52.34.253.52] F= rejected RCPT : relay not permitted
...
2019-11-14 02:43:58
46.38.144.17 attackspambots
Nov 13 19:21:52 relay postfix/smtpd\[25095\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 13 19:22:12 relay postfix/smtpd\[31761\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 13 19:22:29 relay postfix/smtpd\[25046\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 13 19:22:48 relay postfix/smtpd\[32234\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 13 19:23:07 relay postfix/smtpd\[30001\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-14 02:31:00
63.88.23.251 attack
63.88.23.251 was recorded 5 times by 3 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 5, 18, 42
2019-11-14 02:31:55
63.251.152.106 attackspam
RDP Bruteforce
2019-11-14 02:35:07
45.125.65.63 attackspambots
\[2019-11-13 12:43:22\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-13T12:43:22.484-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="46812400530",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.63/51438",ACLName="no_extension_match"
\[2019-11-13 12:43:42\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-13T12:43:42.123-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00246462607502",SessionID="0x7fdf2ccecc48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.63/56559",ACLName="no_extension_match"
\[2019-11-13 12:47:22\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-13T12:47:22.247-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="81046812400530",SessionID="0x7fdf2c1aed28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.63/59940",ACLName="no_extension_ma
2019-11-14 02:13:22
153.126.182.19 attackspambots
Nov 13 19:13:29 mail postfix/smtpd[5664]: warning: ik1-327-23515.vs.sakura.ne.jp[153.126.182.19]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 13 19:13:29 mail postfix/smtpd[8319]: warning: ik1-327-23515.vs.sakura.ne.jp[153.126.182.19]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 13 19:14:42 mail postfix/smtpd[8123]: warning: ik1-327-23515.vs.sakura.ne.jp[153.126.182.19]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-14 02:20:10
223.244.87.132 attack
2019-11-13T17:47:58.640427abusebot-4.cloudsearch.cf sshd\[31003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.244.87.132  user=root
2019-11-14 02:20:52
141.98.80.99 attackspambots
2019-11-14 02:39:40

Recently Reported IPs

134.67.98.71 134.68.21.185 134.60.1.22 134.68.125.197
134.73.36.223 134.65.201.160 134.73.36.249 134.58.64.15
160.12.210.153 134.84.159.77 134.76.18.234 134.87.4.81
134.83.125.134 134.76.31.198 134.87.4.82 134.76.9.48
134.90.155.115 134.90.148.22 134.90.146.70 134.76.24.211