Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.97.250.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18610
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.97.250.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 06:20:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 55.250.97.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.250.97.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.84.95.71 attackbotsspam
Unauthorized connection attempt from IP address 200.84.95.71 on Port 445(SMB)
2019-08-14 13:59:09
14.245.193.205 attackbots
Unauthorized connection attempt from IP address 14.245.193.205 on Port 445(SMB)
2019-08-14 14:38:41
212.109.217.198 attack
ZTE Router Exploit Scanner
2019-08-14 14:13:56
190.226.43.250 attackspam
Unauthorized connection attempt from IP address 190.226.43.250 on Port 445(SMB)
2019-08-14 14:41:31
65.204.12.179 attackbots
Aug 14 07:52:35 mintao sshd\[12642\]: Address 65.204.12.179 maps to business-litigation-associates.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!\
Aug 14 07:52:35 mintao sshd\[12642\]: Invalid user support from 65.204.12.179\
2019-08-14 14:10:32
157.230.128.195 attackbots
Invalid user ubuntu from 157.230.128.195 port 37620
2019-08-14 14:39:05
83.19.158.250 attackbotsspam
Aug 14 02:17:41 vps200512 sshd\[20596\]: Invalid user praveen from 83.19.158.250
Aug 14 02:17:41 vps200512 sshd\[20596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.19.158.250
Aug 14 02:17:43 vps200512 sshd\[20596\]: Failed password for invalid user praveen from 83.19.158.250 port 40984 ssh2
Aug 14 02:23:19 vps200512 sshd\[20698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.19.158.250  user=root
Aug 14 02:23:20 vps200512 sshd\[20698\]: Failed password for root from 83.19.158.250 port 33026 ssh2
2019-08-14 14:28:59
82.114.94.69 attackspambots
:
2019-08-14 14:07:12
83.171.120.235 attack
:
2019-08-14 14:03:37
165.227.122.251 attackspambots
SSH Brute Force
2019-08-14 14:24:21
128.199.136.129 attackspambots
Invalid user training from 128.199.136.129 port 48094
2019-08-14 14:42:23
23.129.64.190 attack
Invalid user admin from 23.129.64.190 port 37570
2019-08-14 14:22:44
79.118.204.117 attack
:
2019-08-14 14:10:06
14.228.219.72 attackspam
Unauthorized connection attempt from IP address 14.228.219.72 on Port 445(SMB)
2019-08-14 14:12:45
103.55.215.49 attackspambots
Unauthorized connection attempt from IP address 103.55.215.49 on Port 445(SMB)
2019-08-14 14:25:27

Recently Reported IPs

156.154.23.6 251.14.91.185 152.214.185.76 103.19.85.234
160.226.87.225 191.223.247.114 43.221.194.197 16.220.17.233
71.171.69.189 150.92.62.45 239.130.13.148 160.208.232.173
249.240.17.68 152.40.61.43 114.155.22.243 2.9.132.113
141.25.149.210 93.130.143.157 199.98.28.15 55.58.79.33