Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.96.195.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22857
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.96.195.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 22:58:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
66.195.96.134.in-addr.arpa domain name pointer client00834.vpn.uni-saarland.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.195.96.134.in-addr.arpa	name = client00834.vpn.uni-saarland.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.238.23.94 attackbots
Unauthorized connection attempt from IP address 178.238.23.94 on Port 445(SMB)
2020-05-24 04:37:34
212.83.183.57 attack
May 23 22:06:41 Invalid user jhk from 212.83.183.57 port 59515
2020-05-24 04:43:30
196.158.129.38 attackspam
Unauthorized connection attempt from IP address 196.158.129.38 on Port 445(SMB)
2020-05-24 04:50:44
51.75.16.138 attackspambots
May 23 22:12:16 abendstille sshd\[13601\]: Invalid user ai from 51.75.16.138
May 23 22:12:16 abendstille sshd\[13601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.16.138
May 23 22:12:18 abendstille sshd\[13601\]: Failed password for invalid user ai from 51.75.16.138 port 52178 ssh2
May 23 22:15:56 abendstille sshd\[17277\]: Invalid user james from 51.75.16.138
May 23 22:15:56 abendstille sshd\[17277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.16.138
...
2020-05-24 04:21:31
176.107.133.228 attackspambots
(sshd) Failed SSH login from 176.107.133.228 (PL/Poland/host228-133-107-176.static.arubacloud.pl): 5 in the last 3600 secs
2020-05-24 04:43:59
138.197.210.82 attackspambots
2020-05-23T16:15:37.042704mail.thespaminator.com sshd[4198]: Invalid user eqn from 138.197.210.82 port 58276
2020-05-23T16:15:39.459503mail.thespaminator.com sshd[4198]: Failed password for invalid user eqn from 138.197.210.82 port 58276 ssh2
...
2020-05-24 04:39:58
118.69.183.237 attack
[ssh] SSH attack
2020-05-24 04:24:58
186.167.48.234 attack
Unauthorized connection attempt from IP address 186.167.48.234 on Port 445(SMB)
2020-05-24 04:42:06
218.92.0.200 attack
May 23 22:15:37 vpn01 sshd[8528]: Failed password for root from 218.92.0.200 port 17051 ssh2
May 23 22:15:39 vpn01 sshd[8528]: Failed password for root from 218.92.0.200 port 17051 ssh2
...
2020-05-24 04:39:40
148.70.58.152 attack
May 23 14:01:58 server1 sshd\[21543\]: Invalid user iva from 148.70.58.152
May 23 14:01:58 server1 sshd\[21543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.58.152 
May 23 14:02:00 server1 sshd\[21543\]: Failed password for invalid user iva from 148.70.58.152 port 36626 ssh2
May 23 14:03:16 server1 sshd\[21882\]: Invalid user gxl from 148.70.58.152
May 23 14:03:16 server1 sshd\[21882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.58.152 
...
2020-05-24 04:17:13
165.22.61.82 attackspambots
May 23 22:26:49 vps sshd[121819]: Failed password for invalid user asp from 165.22.61.82 port 48896 ssh2
May 23 22:30:35 vps sshd[140826]: Invalid user chj from 165.22.61.82 port 54864
May 23 22:30:35 vps sshd[140826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.82
May 23 22:30:36 vps sshd[140826]: Failed password for invalid user chj from 165.22.61.82 port 54864 ssh2
May 23 22:34:17 vps sshd[154829]: Invalid user aboggs from 165.22.61.82 port 60828
...
2020-05-24 04:42:42
220.135.162.48 attackbots
Port probing on unauthorized port 2323
2020-05-24 04:20:11
64.225.42.124 attackspambots
[munged]::443 64.225.42.124 - - [23/May/2020:22:15:46 +0200] "POST /[munged]: HTTP/1.1" 200 6334 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 64.225.42.124 - - [23/May/2020:22:15:47 +0200] "POST /[munged]: HTTP/1.1" 200 6336 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-24 04:32:30
190.15.196.185 attack
05/23/2020-16:15:56.053499 190.15.196.185 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-24 04:22:50
113.21.119.28 attackspam
SSH invalid-user multiple login try
2020-05-24 04:41:00

Recently Reported IPs

66.131.35.47 23.202.2.214 83.236.216.241 147.197.32.69
162.166.47.94 169.131.133.173 117.66.208.23 149.207.77.73
234.212.182.128 100.228.45.254 67.176.49.149 142.102.67.51
26.34.242.255 202.116.151.130 28.174.120.154 161.237.223.207
19.204.50.246 236.42.246.170 244.242.238.106 248.120.190.136