Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.3.134.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.3.134.27.			IN	A

;; AUTHORITY SECTION:
.			209	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020401 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 05 08:47:36 CST 2022
;; MSG SIZE  rcvd: 105
Host info
27.134.3.149.in-addr.arpa domain name pointer 27-134-3-149.rackcentre.redstation.net.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.134.3.149.in-addr.arpa	name = 27-134-3-149.rackcentre.redstation.net.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.89.153.96 attackspam
$f2bV_matches
2020-05-03 19:02:14
123.206.36.174 attackbotsspam
Automatic report BANNED IP
2020-05-03 19:35:10
80.82.70.138 attackspam
May  3 11:40:56 ns3042688 courier-pop3d: LOGIN FAILED, user=cs@sikla-systems.info, ip=\[::ffff:80.82.70.138\]
...
2020-05-03 19:35:54
1.236.151.31 attack
SSH brute-force: detected 14 distinct usernames within a 24-hour window.
2020-05-03 19:16:39
65.98.111.218 attackbots
$f2bV_matches
2020-05-03 19:00:06
115.220.3.88 attackbotsspam
ssh
2020-05-03 18:58:36
106.124.132.105 attack
Invalid user camera from 106.124.132.105 port 57978
2020-05-03 19:04:11
93.75.206.13 attackbots
May  3 10:18:24 vps647732 sshd[3636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.75.206.13
May  3 10:18:25 vps647732 sshd[3636]: Failed password for invalid user admin from 93.75.206.13 port 58919 ssh2
...
2020-05-03 19:19:26
200.146.215.26 attackbotsspam
May  3 10:49:14 game-panel sshd[5552]: Failed password for root from 200.146.215.26 port 43716 ssh2
May  3 10:53:52 game-panel sshd[5824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.215.26
May  3 10:53:55 game-panel sshd[5824]: Failed password for invalid user pj from 200.146.215.26 port 13276 ssh2
2020-05-03 19:12:01
103.74.123.41 attackbots
xmlrpc attack
2020-05-03 18:53:29
200.57.198.58 attack
Invalid user cuccia from 200.57.198.58 port 36516
2020-05-03 18:55:34
175.9.245.254 attackspam
Port probing on unauthorized port 23
2020-05-03 19:21:35
45.236.253.130 attack
Unauthorised access (May  3) SRC=45.236.253.130 LEN=40 TTL=236 ID=47273 DF TCP DPT=8080 WINDOW=14600 SYN
2020-05-03 19:01:33
113.141.66.255 attackspam
Invalid user se from 113.141.66.255 port 47531
2020-05-03 19:02:35
121.204.208.167 attackbots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "heat" at 2020-05-03T06:08:00Z
2020-05-03 18:56:41

Recently Reported IPs

183.82.250.149 127.83.12.233 12.128.200.2 77.70.255.69
76.69.42.111 184.234.185.20 211.172.116.72 186.239.97.135
246.63.231.156 51.85.47.2 89.60.12.161 208.123.167.25
218.34.209.35 237.151.96.202 170.240.55.94 41.88.27.71
110.27.72.46 231.180.62.47 241.219.74.186 0.38.239.198