Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.134.242.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.134.242.245.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:53:36 CST 2025
;; MSG SIZE  rcvd: 108
Host info
245.242.134.135.in-addr.arpa domain name pointer h135-134-242-245.onlswi.broadband.dynamic.tds.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.242.134.135.in-addr.arpa	name = h135-134-242-245.onlswi.broadband.dynamic.tds.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.199.175.58 attack
Invalid user postgres from 104.199.175.58 port 51806
2020-01-18 23:43:55
212.48.70.22 attackspam
Invalid user ubuntu from 212.48.70.22 port 56118
2020-01-18 23:55:49
114.242.143.121 attack
Invalid user andreia from 114.242.143.121 port 13738
2020-01-18 23:39:40
178.128.25.171 attackbots
Unauthorized connection attempt detected from IP address 178.128.25.171 to port 2220 [J]
2020-01-19 00:01:39
179.221.162.146 attackspam
Invalid user test2 from 179.221.162.146 port 41358
2020-01-19 00:00:59
178.128.213.126 attackbots
Unauthorized connection attempt detected from IP address 178.128.213.126 to port 2220 [J]
2020-01-19 00:01:16
119.42.175.200 attackspam
2020-01-18T15:19:47.4696121240 sshd\[32021\]: Invalid user avahi from 119.42.175.200 port 39006
2020-01-18T15:19:47.4727051240 sshd\[32021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200
2020-01-18T15:19:50.1027011240 sshd\[32021\]: Failed password for invalid user avahi from 119.42.175.200 port 39006 ssh2
...
2020-01-18 23:37:09
64.76.6.126 attack
Unauthorized connection attempt detected from IP address 64.76.6.126 to port 2220 [J]
2020-01-18 23:46:37
129.211.141.41 attackbotsspam
Invalid user gj from 129.211.141.41 port 55523
2020-01-19 00:05:47
109.15.50.94 attackbotsspam
Unauthorized connection attempt detected from IP address 109.15.50.94 to port 2220 [J]
2020-01-18 23:41:07
181.48.23.154 attackspambots
Unauthorized connection attempt detected from IP address 181.48.23.154 to port 2220 [J]
2020-01-19 00:00:02
118.89.201.225 attack
Unauthorized connection attempt detected from IP address 118.89.201.225 to port 2220 [J]
2020-01-18 23:37:37
51.68.230.54 attackspambots
SSH bruteforce
2020-01-18 23:48:41
182.61.104.246 attack
Unauthorized connection attempt detected from IP address 182.61.104.246 to port 2220 [J]
2020-01-18 23:58:58
36.91.152.234 attackbots
Unauthorized connection attempt detected from IP address 36.91.152.234 to port 2220 [J]
2020-01-18 23:51:53

Recently Reported IPs

80.65.115.163 79.212.85.216 94.125.42.54 161.20.107.248
59.114.222.97 242.172.21.143 14.117.216.27 143.143.199.0
62.62.103.33 37.19.174.132 131.12.184.23 42.202.105.85
219.100.147.34 91.25.11.60 61.145.44.129 246.252.219.131
170.222.39.195 200.229.114.232 151.38.173.183 108.145.231.85