Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Foz do Iguaçu

Region: Parana

Country: Brazil

Internet Service Provider: TIM

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.11.122.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50386
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.11.122.134.			IN	A

;; AUTHORITY SECTION:
.			137	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022060103 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 02 12:46:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 134.122.11.189.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.122.11.189.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.125.27 attackspambots
Jul  2 03:02:01 MainVPS sshd[3056]: Invalid user applmgr from 106.12.125.27 port 54430
Jul  2 03:02:01 MainVPS sshd[3056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.125.27
Jul  2 03:02:01 MainVPS sshd[3056]: Invalid user applmgr from 106.12.125.27 port 54430
Jul  2 03:02:03 MainVPS sshd[3056]: Failed password for invalid user applmgr from 106.12.125.27 port 54430 ssh2
Jul  2 03:08:28 MainVPS sshd[3492]: Invalid user zule from 106.12.125.27 port 45040
...
2019-07-02 10:31:18
46.242.60.178 attack
Unauthorized connection attempt from IP address 46.242.60.178 on Port 445(SMB)
2019-07-02 10:43:46
45.55.235.208 attack
Jul  2 01:47:01 dedicated sshd[6267]: Invalid user phyto2 from 45.55.235.208 port 60468
2019-07-02 10:36:34
192.241.246.50 attackspam
Brute force attempt
2019-07-02 10:54:56
67.250.162.22 attackbotsspam
$f2bV_matches
2019-07-02 10:16:06
91.243.162.154 attack
Unauthorized connection attempt from IP address 91.243.162.154 on Port 445(SMB)
2019-07-02 10:23:19
89.39.95.93 attack
Jul  2 00:52:40 rigel postfix/smtpd[27602]: connect from unknown[89.39.95.93]
Jul  2 00:52:41 rigel postfix/smtpd[27602]: warning: unknown[89.39.95.93]: SASL CRAM-MD5 authentication failed: authentication failure
Jul  2 00:52:41 rigel postfix/smtpd[27602]: warning: unknown[89.39.95.93]: SASL PLAIN authentication failed: authentication failure
Jul  2 00:52:41 rigel postfix/smtpd[27602]: warning: unknown[89.39.95.93]: SASL LOGIN authentication failed: authentication failure
Jul  2 00:52:42 rigel postfix/smtpd[27602]: disconnect from unknown[89.39.95.93]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=89.39.95.93
2019-07-02 10:56:46
144.121.14.152 attack
Unauthorized connection attempt from IP address 144.121.14.152 on Port 445(SMB)
2019-07-02 10:52:14
24.153.201.28 attackbotsspam
Unauthorized connection attempt from IP address 24.153.201.28 on Port 445(SMB)
2019-07-02 10:24:26
83.142.197.99 attack
Brute force attempt
2019-07-02 10:28:23
180.178.73.202 attackbots
Unauthorized connection attempt from IP address 180.178.73.202 on Port 445(SMB)
2019-07-02 10:22:46
121.147.191.33 attack
Jul  2 02:41:43 rpi sshd[10699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.147.191.33 
Jul  2 02:41:45 rpi sshd[10699]: Failed password for invalid user ssh from 121.147.191.33 port 42488 ssh2
2019-07-02 10:14:15
101.109.83.140 attackspambots
2019-07-01T23:34:49.156423abusebot-4.cloudsearch.cf sshd\[29219\]: Invalid user gu from 101.109.83.140 port 40110
2019-07-02 10:25:47
94.60.46.194 attackspam
Trying to deliver email spam, but blocked by RBL
2019-07-02 10:38:06
61.191.20.20 attackspam
Jul  2 03:23:12 localhost sshd\[27499\]: Invalid user zhouh from 61.191.20.20 port 60821
Jul  2 03:23:12 localhost sshd\[27499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.191.20.20
Jul  2 03:23:14 localhost sshd\[27499\]: Failed password for invalid user zhouh from 61.191.20.20 port 60821 ssh2
2019-07-02 10:14:35

Recently Reported IPs

151.101.24.209 215.253.137.78 2.50.33.229 180.146.247.179
2.118.218.28 86.184.211.174 2.50.204.244 2.46.53.15
2.4.251.37 2.51.31.101 2.72.4.141 2.79.208.9
2.38.96.180 185.212.50.234 2.47.222.75 2.54.16.101
2.54.126.61 2.3.254.78 2.68.194.27 2.4.33.79