Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.189.134.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.189.134.217.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 14:22:00 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 217.134.189.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.134.189.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
74.82.47.16 attack
50070/tcp 873/tcp 9200/tcp...
[2019-05-03/07-03]43pkt,13pt.(tcp),1pt.(udp)
2019-07-04 05:48:33
88.147.244.124 attack
Automatic report - Web App Attack
2019-07-04 05:51:37
149.56.131.251 attackbotsspam
20 attempts against mh-ssh on flow.magehost.pro
2019-07-04 05:50:22
200.100.107.9 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 12:28:55,375 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.100.107.9)
2019-07-04 06:04:15
187.44.149.50 attack
2019-07-03T09:11:47.994186stt-1.[munged] kernel: [6191131.341589] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=187.44.149.50 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=7434 DF PROTO=TCP SPT=10827 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-03T09:11:50.984262stt-1.[munged] kernel: [6191134.331679] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=187.44.149.50 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=7623 DF PROTO=TCP SPT=48483 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-03T09:11:56.999901stt-1.[munged] kernel: [6191140.347331] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=187.44.149.50 DST=[mungedIP1] LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=7976 DF PROTO=TCP SPT=13732 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0
2019-07-04 05:54:52
189.86.200.118 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 19:12:20,066 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.86.200.118)
2019-07-04 05:52:29
51.68.220.249 attackspam
Jul  3 16:31:52 *** sshd[25584]: Failed password for invalid user oracle from 51.68.220.249 port 59272 ssh2
Jul  3 16:45:39 *** sshd[25867]: Failed password for invalid user cigare from 51.68.220.249 port 59872 ssh2
Jul  3 17:03:35 *** sshd[26019]: Failed password for invalid user nrpe from 51.68.220.249 port 44074 ssh2
Jul  3 17:12:33 *** sshd[26157]: Failed password for invalid user rao from 51.68.220.249 port 33264 ssh2
Jul  3 17:37:27 *** sshd[26377]: Failed password for invalid user zimbra from 51.68.220.249 port 48346 ssh2
Jul  3 17:46:10 *** sshd[26570]: Failed password for invalid user huang from 51.68.220.249 port 40146 ssh2
Jul  3 18:03:14 *** sshd[26717]: Failed password for invalid user jacsom from 51.68.220.249 port 40430 ssh2
Jul  3 18:19:29 *** sshd[26907]: Failed password for invalid user admin from 51.68.220.249 port 58436 ssh2
2019-07-04 05:35:56
188.226.160.61 attack
Spam Timestamp : 03-Jul-19 13:36 _ BlockList Provider  combined abuse _ (714)
2019-07-04 05:42:54
162.243.143.136 attackspambots
03.07.2019 15:15:18 Connection to port 7002 blocked by firewall
2019-07-04 06:03:12
142.93.98.26 attackbotsspam
Spam Timestamp : 03-Jul-19 13:43 _ BlockList Provider  combined abuse _ (716)
2019-07-04 05:41:22
200.54.89.218 attackspambots
Spam Timestamp : 03-Jul-19 14:01 _ BlockList Provider  combined abuse _ (719)
2019-07-04 05:38:48
220.130.222.156 attackbotsspam
Jul  3 16:14:56 giegler sshd[30894]: Invalid user admin from 220.130.222.156 port 55630
2019-07-04 06:07:18
144.217.7.154 attackspam
2019-07-03T09:11:58.609383WS-Zach sshd[9758]: User root from 144.217.7.154 not allowed because none of user's groups are listed in AllowGroups
2019-07-03T09:11:58.619939WS-Zach sshd[9758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.7.154  user=root
2019-07-03T09:11:58.609383WS-Zach sshd[9758]: User root from 144.217.7.154 not allowed because none of user's groups are listed in AllowGroups
2019-07-03T09:12:00.821888WS-Zach sshd[9758]: Failed password for invalid user root from 144.217.7.154 port 38942 ssh2
2019-07-03T09:11:58.619939WS-Zach sshd[9758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.7.154  user=root
2019-07-03T09:11:58.609383WS-Zach sshd[9758]: User root from 144.217.7.154 not allowed because none of user's groups are listed in AllowGroups
2019-07-03T09:12:00.821888WS-Zach sshd[9758]: Failed password for invalid user root from 144.217.7.154 port 38942 ssh2
2019-07-03T09:12:04.198509WS-Zach sshd[
2019-07-04 05:51:05
51.254.49.106 attack
143/tcp 993/tcp 1521/tcp...
[2019-05-03/07-03]24pkt,12pt.(tcp)
2019-07-04 05:45:35
198.199.106.97 attackbots
3389/tcp 88/tcp 16203/tcp...
[2019-05-03/07-03]49pkt,38pt.(tcp),6pt.(udp)
2019-07-04 05:55:58

Recently Reported IPs

56.110.225.210 244.152.99.206 30.171.32.158 207.94.87.229
228.71.155.113 48.226.233.172 223.101.93.4 202.24.246.161
180.227.61.237 165.77.218.153 153.99.6.4 2.253.99.72
72.91.59.78 207.165.199.7 37.67.242.77 74.237.77.222
120.67.115.248 4.93.186.45 130.29.110.157 104.252.169.57