Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Indianapolis

Region: Indiana

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.68.228.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31914
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.68.228.31.			IN	A

;; AUTHORITY SECTION:
.			40	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050200 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 02 16:07:47 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 31.228.68.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 31.228.68.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.18.106.113 attackbotsspam
Automatic report - Port Scan Attack
2020-03-22 16:44:38
92.53.90.84 attackspam
RDP Bruteforce
2020-03-22 16:47:55
140.143.236.227 attack
SSH Login Bruteforce
2020-03-22 17:05:21
113.176.70.73 attackbots
1584849166 - 03/22/2020 04:52:46 Host: 113.176.70.73/113.176.70.73 Port: 445 TCP Blocked
2020-03-22 16:49:08
125.212.159.133 attackspam
1584849191 - 03/22/2020 04:53:11 Host: 125.212.159.133/125.212.159.133 Port: 445 TCP Blocked
2020-03-22 16:28:33
86.21.205.149 attackspam
SSH Brute-Force Attack
2020-03-22 16:37:55
80.82.77.86 attackbotsspam
port
2020-03-22 16:59:14
192.241.235.228 attackbots
1584849149 - 03/22/2020 04:52:29 Host: zg-0312b-18.stretchoid.com/192.241.235.228 Port: 161 UDP Blocked
2020-03-22 16:59:35
111.231.108.97 attack
SSH login attempts.
2020-03-22 16:47:16
148.70.159.181 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-22 16:34:37
167.56.93.204 attack
Automatic report - Port Scan Attack
2020-03-22 16:42:01
5.196.192.162 attackbotsspam
$f2bV_matches
2020-03-22 16:22:24
117.5.73.117 attack
Automatic report - Port Scan Attack
2020-03-22 16:21:00
133.130.119.178 attackbotsspam
SSH Brute-Force attacks
2020-03-22 16:42:49
156.96.63.238 attack
[2020-03-22 04:18:55] NOTICE[1148][C-0001480d] chan_sip.c: Call from '' (156.96.63.238:54288) to extension '010441223931090' rejected because extension not found in context 'public'.
[2020-03-22 04:18:55] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-22T04:18:55.818-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="010441223931090",SessionID="0x7fd82c40aa58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.63.238/54288",ACLName="no_extension_match"
[2020-03-22 04:19:35] NOTICE[1148][C-0001480f] chan_sip.c: Call from '' (156.96.63.238:55370) to extension '0+0441223931090' rejected because extension not found in context 'public'.
[2020-03-22 04:19:35] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-22T04:19:35.649-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0+0441223931090",SessionID="0x7fd82c40aa58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-03-22 16:27:06

Recently Reported IPs

193.224.158.65 140.116.243.158 193.190.191.90 163.22.18.45
140.116.20.41 66.96.228.56 140.116.164.108 140.116.159.219
112.251.110.1 140.116.117.206 131.114.191.226 140.116.188.213
132.234.229.115 163.22.18.105 140.116.25.160 131.251.254.206
210.107.129.116 140.116.138.68 136.176.200.10 134.169.69.18