Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.2.134.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52099
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;161.2.134.197.			IN	A

;; AUTHORITY SECTION:
.			585	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071001 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 11 03:52:24 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 197.134.2.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.134.2.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.206.184.27 attack
" "
2019-11-29 13:06:09
172.94.99.203 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-11-29 13:01:05
45.45.45.45 attackspambots
29.11.2019 04:58:39 Recursive DNS scan
2019-11-29 13:18:53
37.187.54.45 attackbots
Nov 29 07:15:00 server sshd\[7211\]: Invalid user kbps from 37.187.54.45 port 33276
Nov 29 07:15:00 server sshd\[7211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45
Nov 29 07:15:02 server sshd\[7211\]: Failed password for invalid user kbps from 37.187.54.45 port 33276 ssh2
Nov 29 07:18:05 server sshd\[31281\]: User root from 37.187.54.45 not allowed because listed in DenyUsers
Nov 29 07:18:05 server sshd\[31281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45  user=root
2019-11-29 13:30:54
187.72.118.191 attackbotsspam
Nov 29 05:56:04 lnxweb62 sshd[24616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.118.191
Nov 29 05:56:05 lnxweb62 sshd[24616]: Failed password for invalid user gorin from 187.72.118.191 port 49584 ssh2
Nov 29 05:59:39 lnxweb62 sshd[26458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.118.191
2019-11-29 13:17:10
212.129.52.3 attackspam
Nov 29 05:58:48 nextcloud sshd\[30523\]: Invalid user cimp from 212.129.52.3
Nov 29 05:58:48 nextcloud sshd\[30523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.52.3
Nov 29 05:58:49 nextcloud sshd\[30523\]: Failed password for invalid user cimp from 212.129.52.3 port 29141 ssh2
...
2019-11-29 13:11:55
117.150.88.231 attack
Automatic report - Port Scan
2019-11-29 13:03:15
134.209.147.198 attackbotsspam
Nov 29 10:31:29 areeb-Workstation sshd[2434]: Failed password for sshd from 134.209.147.198 port 50756 ssh2
...
2019-11-29 13:14:11
27.12.151.163 attackspam
Fail2Ban Ban Triggered
2019-11-29 13:00:40
129.211.27.10 attackspambots
$f2bV_matches
2019-11-29 13:04:47
62.90.235.90 attackspam
Nov 29 04:59:01 marvibiene sshd[59935]: Invalid user hakuta from 62.90.235.90 port 38966
Nov 29 04:59:01 marvibiene sshd[59935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.90.235.90
Nov 29 04:59:01 marvibiene sshd[59935]: Invalid user hakuta from 62.90.235.90 port 38966
Nov 29 04:59:03 marvibiene sshd[59935]: Failed password for invalid user hakuta from 62.90.235.90 port 38966 ssh2
...
2019-11-29 13:04:00
106.12.152.194 attackspam
11/28/2019-23:59:06.975780 106.12.152.194 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-29 13:02:24
112.13.91.29 attackbotsspam
2019-11-29T00:44:24.767434abusebot-7.cloudsearch.cf sshd\[3054\]: Invalid user ident from 112.13.91.29 port 2097
2019-11-29 09:27:09
211.157.189.54 attackbots
2019-11-29T06:02:58.860491ns386461 sshd\[10739\]: Invalid user biro from 211.157.189.54 port 38775
2019-11-29T06:02:58.865654ns386461 sshd\[10739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.189.54
2019-11-29T06:03:00.928000ns386461 sshd\[10739\]: Failed password for invalid user biro from 211.157.189.54 port 38775 ssh2
2019-11-29T06:16:16.861258ns386461 sshd\[22112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.189.54  user=root
2019-11-29T06:16:18.810217ns386461 sshd\[22112\]: Failed password for root from 211.157.189.54 port 54307 ssh2
...
2019-11-29 13:33:39
139.199.58.118 attack
Nov 29 06:58:31 www5 sshd\[34350\]: Invalid user class from 139.199.58.118
Nov 29 06:58:31 www5 sshd\[34350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.58.118
Nov 29 06:58:33 www5 sshd\[34350\]: Failed password for invalid user class from 139.199.58.118 port 44048 ssh2
...
2019-11-29 13:20:26

Recently Reported IPs

154.102.43.152 130.123.4.82 113.160.172.248 161.69.122.15
142.119.13.201 103.1.179.128 1.55.207.242 178.186.85.151
138.122.96.153 125.163.115.190 83.149.47.6 171.240.88.205
104.129.194.250 83.234.163.214 106.208.139.143 103.83.129.216
190.135.241.189 227.152.22.146 123.139.243.35 151.1.72.185