Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.254.134.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.254.134.12.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 11:53:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 12.134.254.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.134.254.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.95.177.11 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:50:53,115 INFO [amun_request_handler] PortScan Detected on Port: 445 (85.95.177.11)
2019-07-11 14:49:19
182.75.201.82 attackspambots
$f2bV_matches
2019-07-11 15:36:06
31.207.45.217 attackspambots
spf=pass (google.com: domain of return@pro.berlin.mydns.jp designates 31.207.45.217 as permitted sender) smtp.mailfrom=return@pro.berlin.mydns.jp
2019-07-11 15:21:59
1.59.91.23 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 15:06:02
60.190.152.242 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:29:16,982 INFO [amun_request_handler] PortScan Detected on Port: 445 (60.190.152.242)
2019-07-11 15:33:28
113.169.149.153 attackbots
" "
2019-07-11 15:07:38
192.99.216.184 attackbotsspam
SSH Brute-Force attacks
2019-07-11 15:11:21
191.53.223.240 attackbotsspam
failed_logins
2019-07-11 15:32:49
42.118.9.140 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:46:15,148 INFO [amun_request_handler] PortScan Detected on Port: 445 (42.118.9.140)
2019-07-11 15:00:44
190.196.182.149 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:35:58,426 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.196.182.149)
2019-07-11 15:18:47
106.245.255.19 attackspambots
Attempted SSH login
2019-07-11 14:52:49
146.88.240.4 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-11 14:55:49
61.163.69.170 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-07-11 15:40:28
41.33.52.35 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:35:48,711 INFO [amun_request_handler] PortScan Detected on Port: 445 (41.33.52.35)
2019-07-11 15:20:03
181.143.79.154 attack
proto=tcp  .  spt=47206  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (247)
2019-07-11 15:14:57

Recently Reported IPs

128.146.233.114 88.119.60.35 223.85.221.217 133.97.247.162
193.14.85.138 214.30.50.19 69.151.132.60 39.42.93.47
140.238.63.192 70.227.70.233 26.66.241.198 203.86.108.107
110.42.47.249 54.19.24.230 48.253.246.134 196.227.25.110
206.231.8.245 251.162.93.190 234.114.20.210 30.212.149.168