Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.80.196.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.80.196.226.			IN	A

;; AUTHORITY SECTION:
.			144	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 27 17:24:43 CST 2021
;; MSG SIZE  rcvd: 107
Host info
b'Host 226.196.80.134.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 134.80.196.226.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
88.135.49.14 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 05:08:02
66.70.189.209 attackbotsspam
Feb 25 21:48:03 jane sshd[31560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.209 
Feb 25 21:48:04 jane sshd[31560]: Failed password for invalid user test from 66.70.189.209 port 59309 ssh2
...
2020-02-26 05:06:40
109.201.38.12 attackspam
1433/tcp
[2020-02-25]1pkt
2020-02-26 04:38:45
180.218.144.208 attackbotsspam
Honeypot attack, port: 5555, PTR: 180-218-144-208.dynamic.twmbroadband.net.
2020-02-26 04:54:09
92.74.147.210 attackspam
Feb 25 21:39:20 MK-Soft-Root1 sshd[19217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.74.147.210 
Feb 25 21:39:21 MK-Soft-Root1 sshd[19217]: Failed password for invalid user anton from 92.74.147.210 port 44100 ssh2
...
2020-02-26 04:49:43
175.37.65.235 attackspambots
4567/tcp
[2020-02-25]1pkt
2020-02-26 05:01:51
218.4.234.74 attackspam
Feb 25 17:35:56 sso sshd[28820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.234.74
Feb 25 17:35:57 sso sshd[28820]: Failed password for invalid user kevin from 218.4.234.74 port 2075 ssh2
...
2020-02-26 04:39:04
103.35.116.82 attackbotsspam
8022/tcp
[2020-02-25]1pkt
2020-02-26 05:09:21
63.83.78.249 attackbotsspam
RBL listed IP. Trying to send Spam. IP autobanned
2020-02-26 04:45:38
69.141.13.42 attackbots
Honeypot attack, port: 81, PTR: c-69-141-13-42.hsd1.nj.comcast.net.
2020-02-26 04:48:09
93.114.205.113 attack
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-26 05:00:28
185.234.217.32 attackspam
20 attempts against mh-misbehave-ban on train
2020-02-26 04:57:59
59.28.26.200 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-26 05:02:08
189.46.173.31 attack
Unauthorised access (Feb 25) SRC=189.46.173.31 LEN=52 TTL=114 ID=24482 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-26 04:59:08
177.9.74.206 attackspam
Port probing on unauthorized port 8080
2020-02-26 04:38:06

Recently Reported IPs

38.62.248.47 176.194.119.159 24.108.124.83 20.50.2.219
59.252.95.56 173.20.46.148 219.11.236.175 55.167.122.20
228.4.154.135 163.26.161.48 180.157.166.204 217.172.125.52
125.247.98.51 102.203.36.31 128.199.182.247 232.234.8.119
255.47.200.6 142.26.245.36 155.112.58.29 117.56.208.97