Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.85.95.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.85.95.139.			IN	A

;; AUTHORITY SECTION:
.			215	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011400 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 14 15:11:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
139.95.85.134.in-addr.arpa domain name pointer nothing.attdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.95.85.134.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
84.53.228.124 attack
" "
2019-10-01 04:28:28
111.198.54.173 attackbots
Sep 30 05:45:15 php1 sshd\[23318\]: Invalid user password123 from 111.198.54.173
Sep 30 05:45:15 php1 sshd\[23318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.173
Sep 30 05:45:17 php1 sshd\[23318\]: Failed password for invalid user password123 from 111.198.54.173 port 58314 ssh2
Sep 30 05:50:28 php1 sshd\[23779\]: Invalid user cpanel123123 from 111.198.54.173
Sep 30 05:50:28 php1 sshd\[23779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.173
2019-10-01 04:20:12
217.182.158.104 attackspam
Sep 30 19:09:05 XXXXXX sshd[61942]: Invalid user alex from 217.182.158.104 port 26221
2019-10-01 04:20:53
45.55.145.31 attackbotsspam
2019-09-30T10:44:02.5858791495-001 sshd\[49249\]: Invalid user test2 from 45.55.145.31 port 52740
2019-09-30T10:44:02.5888761495-001 sshd\[49249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.145.31
2019-09-30T10:44:04.9624881495-001 sshd\[49249\]: Failed password for invalid user test2 from 45.55.145.31 port 52740 ssh2
2019-09-30T10:48:12.6380171495-001 sshd\[49520\]: Invalid user sen from 45.55.145.31 port 44763
2019-09-30T10:48:12.6456841495-001 sshd\[49520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.145.31
2019-09-30T10:48:14.3378441495-001 sshd\[49520\]: Failed password for invalid user sen from 45.55.145.31 port 44763 ssh2
...
2019-10-01 04:11:49
195.175.17.158 attackspambots
445/tcp
[2019-09-30]1pkt
2019-10-01 04:34:45
37.110.81.170 attackbots
no
2019-10-01 04:46:13
151.50.64.41 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-10-01 04:26:33
52.232.67.76 attack
Unauthorized SSH login attempts
2019-10-01 04:13:28
77.42.118.108 attackspam
firewall-block, port(s): 23/tcp
2019-10-01 04:36:02
60.249.188.118 attack
Automatic report - Banned IP Access
2019-10-01 04:25:17
1.172.184.88 attackbots
Honeypot attack, port: 23, PTR: 1-172-184-88.dynamic-ip.hinet.net.
2019-10-01 04:49:01
61.223.88.132 attackspam
Honeypot attack, port: 23, PTR: 61-223-88-132.dynamic-ip.hinet.net.
2019-10-01 04:45:54
188.165.240.15 attackbots
Automatic report - XMLRPC Attack
2019-10-01 04:36:45
109.232.106.169 attackbots
firewall-block, port(s): 34567/tcp
2019-10-01 04:27:27
88.249.24.169 attackspambots
445/tcp
[2019-09-30]1pkt
2019-10-01 04:31:12

Recently Reported IPs

146.19.125.4 51.9.112.65 223.171.91.148 111.52.139.172
120.245.114.116 129.232.53.58 179.168.10.55 47.94.154.183
22.34.250.170 117.68.66.233 54.241.46.184 216.6.45.2
125.192.142.71 75.15.2.16 106.119.159.96 195.47.240.55
118.238.205.234 118.238.205.5 51.209.195.200 51.47.143.43