Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.192.194.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.192.194.134.		IN	A

;; AUTHORITY SECTION:
.			331	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 18:59:40 CST 2020
;; MSG SIZE  rcvd: 119
Host info
134.194.192.140.in-addr.arpa domain name pointer sac-194-134.sac-3.depaul.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.194.192.140.in-addr.arpa	name = sac-194-134.sac-3.depaul.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.97.183.181 attack
Very low quality (reply to GMail) 419/phishing.
2020-01-24 01:30:29
5.196.29.194 attack
Jan 23 17:40:09 meumeu sshd[10500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.29.194 
Jan 23 17:40:11 meumeu sshd[10500]: Failed password for invalid user oracle1 from 5.196.29.194 port 49033 ssh2
Jan 23 17:43:12 meumeu sshd[11007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.29.194 
...
2020-01-24 00:57:28
121.112.47.20 attack
Automatic report - Port Scan Attack
2020-01-24 01:39:27
103.54.27.128 attackspam
"SQL 1 = 1 - possible sql injection attempt"
2020-01-24 00:57:03
103.38.15.19 attack
Cluster member 192.168.0.31 (-) said, DENY 103.38.15.19, Reason:[(imapd) Failed IMAP login from 103.38.15.19 (IN/India/dwan.co.in.15.38.103.in-addr.arpa): 1 in the last 3600 secs]
2020-01-24 01:29:30
157.245.157.239 attackbots
Invalid user upload from 157.245.157.239 port 34446
2020-01-24 01:46:42
205.185.113.140 attackspambots
Jan 23 22:01:13 areeb-Workstation sshd[11987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140 
Jan 23 22:01:15 areeb-Workstation sshd[11987]: Failed password for invalid user kathrin from 205.185.113.140 port 57192 ssh2
...
2020-01-24 01:24:19
222.186.31.135 attack
Jan 23 18:34:05 localhost sshd\[29842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Jan 23 18:34:06 localhost sshd\[29842\]: Failed password for root from 222.186.31.135 port 26932 ssh2
Jan 23 18:34:09 localhost sshd\[29842\]: Failed password for root from 222.186.31.135 port 26932 ssh2
2020-01-24 01:39:42
114.79.146.115 attack
Jan 23 13:44:57 vps46666688 sshd[31988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.79.146.115
Jan 23 13:44:59 vps46666688 sshd[31988]: Failed password for invalid user laura from 114.79.146.115 port 39990 ssh2
...
2020-01-24 01:28:56
5.11.179.161 attackbots
Automatic report - Port Scan Attack
2020-01-24 00:53:36
46.246.45.138 attackbotsspam
Jan 23 17:23:40 mout sshd[15766]: Invalid user git from 46.246.45.138 port 35151
Jan 23 17:23:42 mout sshd[15766]: Failed password for invalid user git from 46.246.45.138 port 35151 ssh2
Jan 23 17:23:42 mout sshd[15766]: Connection closed by 46.246.45.138 port 35151 [preauth]
2020-01-24 01:34:40
170.130.187.42 attackbotsspam
Unauthorized connection attempt detected from IP address 170.130.187.42 to port 21
2020-01-24 01:36:42
71.6.232.5 attack
firewall-block, port(s): 623/tcp
2020-01-24 00:52:01
222.186.180.142 attackbotsspam
$f2bV_matches
2020-01-24 01:44:27
217.173.253.102 attackbotsspam
Spam
2020-01-24 01:46:17

Recently Reported IPs

195.246.82.197 115.131.177.42 106.123.17.60 192.206.107.121
37.159.78.136 197.104.58.146 139.240.210.220 35.94.239.182
93.114.198.46 64.111.168.78 84.83.66.53 118.25.123.165
197.93.2.192 81.117.231.216 177.200.123.192 115.60.208.130
85.242.20.75 73.229.0.77 116.212.158.180 32.62.217.55