Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.9.106.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.9.106.11.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102901 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 08:54:09 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 11.106.9.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.106.9.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.233.171 attackspambots
Jul  1 05:39:36 vpn01 sshd\[24603\]: Invalid user db2inst1 from 159.65.233.171
Jul  1 05:39:36 vpn01 sshd\[24603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.233.171
Jul  1 05:39:38 vpn01 sshd\[24603\]: Failed password for invalid user db2inst1 from 159.65.233.171 port 60570 ssh2
2019-07-01 21:39:55
187.188.90.141 attack
SSH invalid-user multiple login attempts
2019-07-01 21:12:35
82.221.128.73 attackspambots
Portscanning on different or same port(s).
2019-07-01 21:09:52
79.137.74.57 attackspambots
Jul  1 08:49:16 tux-35-217 sshd\[23157\]: Invalid user alpha from 79.137.74.57 port 47774
Jul  1 08:49:16 tux-35-217 sshd\[23157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.74.57
Jul  1 08:49:18 tux-35-217 sshd\[23157\]: Failed password for invalid user alpha from 79.137.74.57 port 47774 ssh2
Jul  1 08:51:50 tux-35-217 sshd\[23161\]: Invalid user leng from 79.137.74.57 port 35413
Jul  1 08:51:50 tux-35-217 sshd\[23161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.74.57
...
2019-07-01 21:42:13
46.141.100.66 attack
46.141.100.66 - - [29/Jun/2019:22:08:50 -0500] "GET /phpmy/index.php?lang=en HTTP/1.1" 404 277 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
46.141.100.66 - - [29/Jun/2019:22:08:50 -0500] "GET /wp-content/plugins/portable-phpmyadmin/wp-pma-mod/index.php?lang=en HTTP/1.1" 404 321 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
46.141.100.66 - - [29/Jun/2019:22:08:49 -0500] "GET /2phpmyadmin/index.php?lang=en HTTP/1.1" 404 283 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
46.141.100.66 - - [29/Jun/2019:22:08:49 -0500] "GET /phpmyadmin4/index.php?lang=en HTTP/1.1" 404 283 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
2019-07-01 21:48:59
116.249.152.234 attack
5500/tcp
[2019-07-01]1pkt
2019-07-01 21:58:43
210.212.249.228 attackbots
Jul  1 15:41:51 web2 sshd[20291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.249.228
Jul  1 15:41:52 web2 sshd[20291]: Failed password for invalid user admin from 210.212.249.228 port 53114 ssh2
2019-07-01 21:49:22
128.76.133.62 attack
Jul  1 03:40:22 marvibiene sshd[60176]: Invalid user apagar from 128.76.133.62 port 45058
Jul  1 03:40:22 marvibiene sshd[60176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.76.133.62
Jul  1 03:40:22 marvibiene sshd[60176]: Invalid user apagar from 128.76.133.62 port 45058
Jul  1 03:40:24 marvibiene sshd[60176]: Failed password for invalid user apagar from 128.76.133.62 port 45058 ssh2
...
2019-07-01 21:16:30
106.13.112.116 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-01 21:29:45
217.182.103.201 attackspambots
[WP scan/spam/exploit]
[multiweb: req 7 domains(hosts/ip)]
[bad UserAgent]
Blocklist.DE:"listed [bruteforcelogin]"
2019-07-01 21:33:37
109.123.117.236 attackbotsspam
8080/tcp 4434/tcp 2086/tcp...
[2019-05-01/07-01]16pkt,15pt.(tcp),1pt.(udp)
2019-07-01 21:11:02
216.218.206.122 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-01 21:05:41
34.214.141.192 attack
Bad bot/spoofed identity
2019-07-01 21:31:20
209.17.97.18 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-01 21:57:03
1.190.186.229 attack
" "
2019-07-01 21:06:20

Recently Reported IPs

41.76.42.241 136.215.112.172 57.161.142.102 226.168.172.191
3.106.250.7 95.145.123.57 71.33.155.15 223.227.237.250
162.99.102.243 90.227.81.56 236.47.54.124 154.134.172.247
233.38.245.6 135.122.131.4 47.193.103.130 154.170.77.59
119.17.124.104 6.86.184.133 126.19.172.34 195.54.207.110