Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.84.2.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.84.2.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 00:50:56 CST 2025
;; MSG SIZE  rcvd: 103
Host info
2.2.84.134.in-addr.arpa domain name pointer infra06-wg009.vpn.umn.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.2.84.134.in-addr.arpa	name = infra06-wg009.vpn.umn.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.237.154.173 attackbotsspam
Autoban   1.237.154.173 AUTH/CONNECT
2019-06-30 01:14:05
183.236.34.130 attackbots
DATE:2019-06-29 10:25:47, IP:183.236.34.130, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-06-30 01:56:39
104.196.50.15 attack
Jun 24 21:52:23 myhostname sshd[24880]: Invalid user ubuntu from 104.196.50.15
Jun 24 21:52:23 myhostname sshd[24880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.196.50.15
Jun 24 21:52:25 myhostname sshd[24880]: Failed password for invalid user ubuntu from 104.196.50.15 port 45746 ssh2
Jun 24 21:52:25 myhostname sshd[24880]: Received disconnect from 104.196.50.15 port 45746:11: Bye Bye [preauth]
Jun 24 21:52:25 myhostname sshd[24880]: Disconnected from 104.196.50.15 port 45746 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.196.50.15
2019-06-30 00:58:30
60.16.101.167 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-30 01:26:31
87.27.223.155 attackbots
Jun 28 03:32:12 mail sshd[7413]: Invalid user ug from 87.27.223.155
Jun 28 03:32:12 mail sshd[7413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.27.223.155
Jun 28 03:32:12 mail sshd[7413]: Invalid user ug from 87.27.223.155
Jun 28 03:32:14 mail sshd[7413]: Failed password for invalid user ug from 87.27.223.155 port 55129 ssh2
Jun 28 03:34:49 mail sshd[11274]: Invalid user nh from 87.27.223.155
...
2019-06-30 01:37:17
82.64.94.134 attackspambots
Jun 28 02:46:30 mail sshd[4577]: Invalid user edwin from 82.64.94.134
Jun 28 02:46:30 mail sshd[4577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.94.134
Jun 28 02:46:30 mail sshd[4577]: Invalid user edwin from 82.64.94.134
Jun 28 02:46:32 mail sshd[4577]: Failed password for invalid user edwin from 82.64.94.134 port 37272 ssh2
...
2019-06-30 01:47:04
74.82.47.16 attackbotsspam
Honeypot attack, port: 23, PTR: scan-11c.shadowserver.org.
2019-06-30 01:45:50
149.202.45.205 attackbotsspam
Invalid user julien from 149.202.45.205 port 55714
2019-06-30 01:40:23
94.23.149.25 attackspambots
Jun 28 05:17:38 mail sshd[1322]: Invalid user angele from 94.23.149.25
Jun 28 05:17:38 mail sshd[1322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.149.25
Jun 28 05:17:38 mail sshd[1322]: Invalid user angele from 94.23.149.25
Jun 28 05:17:40 mail sshd[1322]: Failed password for invalid user angele from 94.23.149.25 port 54790 ssh2
Jun 28 05:20:58 mail sshd[5907]: Invalid user ubuntu from 94.23.149.25
...
2019-06-30 01:23:16
43.229.89.49 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-06-30 01:26:06
1.32.249.100 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-06-30 01:15:45
4.78.193.138 attackbots
Automatic report - Web App Attack
2019-06-30 01:41:58
209.186.58.108 attackspambots
29.06.2019 10:26:29 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-06-30 01:22:12
68.183.178.162 attackbots
Jun 29 19:02:24 server sshd[35718]: Failed password for invalid user vivek from 68.183.178.162 port 53146 ssh2
Jun 29 19:05:39 server sshd[36413]: Failed password for invalid user olivetti from 68.183.178.162 port 58104 ssh2
Jun 29 19:07:23 server sshd[36782]: Failed password for invalid user kush from 68.183.178.162 port 46552 ssh2
2019-06-30 01:37:42
119.118.102.56 attackbotsspam
Unauthorised access (Jun 29) SRC=119.118.102.56 LEN=40 TTL=49 ID=26275 TCP DPT=23 WINDOW=19009 SYN
2019-06-30 01:09:56

Recently Reported IPs

54.108.76.223 28.237.72.59 187.43.106.202 194.226.183.2
142.234.16.146 78.215.71.186 196.142.189.170 92.165.144.44
195.146.221.86 82.80.12.168 6.15.226.249 214.10.147.36
48.164.79.233 86.5.114.140 200.149.240.124 38.25.178.225
210.171.47.204 56.146.92.74 50.134.89.217 36.244.235.212