Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.76.9.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.76.9.14.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:54:04 CST 2022
;; MSG SIZE  rcvd: 104
Host info
14.9.76.134.in-addr.arpa domain name pointer maxcineapp.ab.mpg.de.
14.9.76.134.in-addr.arpa domain name pointer baug-umg.de.
14.9.76.134.in-addr.arpa domain name pointer studieren-in-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer num-bfast.de.
14.9.76.134.in-addr.arpa domain name pointer farmerspace.uni-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer open-forecast.eu.
14.9.76.134.in-addr.arpa domain name pointer stiftung-ernst-waldschmidt.de.
14.9.76.134.in-addr.arpa domain name pointer atng.org.
14.9.76.134.in-addr.arpa domain name pointer vweb14.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer universitaetsenergie.de.
14.9.76.134.in-addr.arpa domain name pointer litlog.de.
14.9.76.134.in-addr.arpa domain name pointer pilz.uni-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer eni.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer ip4.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer studium-in-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer n2-networ
Nslookup info:
b';; Truncated, retrying in TCP mode.
14.9.76.134.in-addr.arpa	name = welcome-to-suedniedersachsen.de.
14.9.76.134.in-addr.arpa	name = litlog.de.
14.9.76.134.in-addr.arpa	name = d-tras.eu.
14.9.76.134.in-addr.arpa	name = europar.org.
14.9.76.134.in-addr.arpa	name = hochschul-cio.de.
14.9.76.134.in-addr.arpa	name = n2-network.net.
14.9.76.134.in-addr.arpa	name = ifnano.de.
14.9.76.134.in-addr.arpa	name = num-bfast.de.
14.9.76.134.in-addr.arpa	name = dtras.eu.
14.9.76.134.in-addr.arpa	name = pilz.uni-goettingen.de.
14.9.76.134.in-addr.arpa	name = maxcineapp.ab.mpg.de.
14.9.76.134.in-addr.arpa	name = farmerspace.uni-goettingen.de.
14.9.76.134.in-addr.arpa	name = atng.org.
14.9.76.134.in-addr.arpa	name = studieren-in-goettingen.de.
14.9.76.134.in-addr.arpa	name = open-forecast.eu.
14.9.76.134.in-addr.arpa	name = euro-par.org.
14.9.76.134.in-addr.arpa	name = universitaetsenergie.de.
14.9.76.134.in-addr.arpa	name = baug-umg.de.
14.9.76.134.in-addr.arpa	name = ip4.gwdg.de.
14.9.76.134.in-addr.arpa	name = studium-in-goettingen.de.
14.9.76.134.in-addr.arpa	name = eni.gwdg.de.
14.9.76.134.in-addr.arpa	name = vweb14.gwdg.de.
14.9.76.134.in-addr.arpa	name = co3learn.de.
14.9.76.134.in-addr.arpa	name = studiumingoettingen.de.
14.9.76.134.in-addr.arpa	name = stiftung-ernst-waldschmidt.de.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
49.70.162.150 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-03 09:20:01
139.59.61.186 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-03-03 09:29:21
112.119.243.98 attackbots
Unauthorized connection attempt detected from IP address 112.119.243.98 to port 5555 [J]
2020-03-03 09:22:34
202.51.98.226 attack
Mar  3 04:28:17 areeb-Workstation sshd[28171]: Failed password for speech-dispatcher from 202.51.98.226 port 33412 ssh2
...
2020-03-03 08:54:00
216.250.119.85 attackspambots
Mar  3 00:17:05 IngegnereFirenze sshd[17567]: Failed password for invalid user ubuntu from 216.250.119.85 port 58806 ssh2
...
2020-03-03 09:29:06
103.253.1.227 attack
Unauthorized connection attempt detected from IP address 103.253.1.227 to port 5555 [J]
2020-03-03 09:27:28
167.250.72.34 attack
SSH attack
2020-03-03 09:00:47
210.48.146.61 attackbots
Mar  3 01:54:34 web1 sshd\[4190\]: Invalid user ftpuser from 210.48.146.61
Mar  3 01:54:34 web1 sshd\[4190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61
Mar  3 01:54:37 web1 sshd\[4190\]: Failed password for invalid user ftpuser from 210.48.146.61 port 49028 ssh2
Mar  3 01:58:28 web1 sshd\[4350\]: Invalid user www from 210.48.146.61
Mar  3 01:58:28 web1 sshd\[4350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61
2020-03-03 09:23:46
207.107.139.150 attack
Mar  2 23:03:56 [snip] sshd[4421]: Invalid user onion from 207.107.139.150 port 43232
Mar  2 23:03:56 [snip] sshd[4421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.107.139.150
Mar  2 23:03:58 [snip] sshd[4421]: Failed password for invalid user onion from 207.107.139.150 port 43232 ssh2[...]
2020-03-03 09:03:40
116.104.32.122 attackbots
Unauthorized connection attempt detected from IP address 116.104.32.122 to port 23 [J]
2020-03-03 08:55:44
92.118.161.17 attackbots
Unauthorized connection attempt detected from IP address 92.118.161.17 to port 7547 [J]
2020-03-03 08:58:58
203.76.132.186 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 02-03-2020 22:00:12.
2020-03-03 08:57:17
61.160.245.87 attackbots
Mar  2 13:36:28 web1 sshd\[22417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.245.87  user=root
Mar  2 13:36:31 web1 sshd\[22417\]: Failed password for root from 61.160.245.87 port 37376 ssh2
Mar  2 13:45:43 web1 sshd\[23301\]: Invalid user ts6 from 61.160.245.87
Mar  2 13:45:43 web1 sshd\[23301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.245.87
Mar  2 13:45:44 web1 sshd\[23301\]: Failed password for invalid user ts6 from 61.160.245.87 port 35662 ssh2
2020-03-03 09:26:40
114.23.220.120 attack
(sshd) Failed SSH login from 114.23.220.120 (NZ/New Zealand/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  3 01:55:58 amsweb01 sshd[8863]: Invalid user www from 114.23.220.120 port 36902
Mar  3 01:56:00 amsweb01 sshd[8863]: Failed password for invalid user www from 114.23.220.120 port 36902 ssh2
Mar  3 01:59:53 amsweb01 sshd[9189]: User admin from 114.23.220.120 not allowed because not listed in AllowUsers
Mar  3 01:59:54 amsweb01 sshd[9189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.23.220.120  user=admin
Mar  3 01:59:56 amsweb01 sshd[9189]: Failed password for invalid user admin from 114.23.220.120 port 36274 ssh2
2020-03-03 09:11:47
58.244.107.61 attackspambots
firewall-block, port(s): 23/tcp
2020-03-03 09:07:05

Recently Reported IPs

134.78.121.168 134.82.236.211 134.83.228.20 118.174.164.108
134.84.138.9 134.83.254.6 134.84.159.176 134.83.254.248
134.85.102.108 134.83.36.2 134.87.96.183 134.86.209.181
134.88.1.12 134.87.88.180 134.86.81.5 118.174.164.11
134.89.2.18 134.9.198.35 134.9.104.197 134.90.143.87