Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.213.34.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.213.34.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 07:56:10 CST 2025
;; MSG SIZE  rcvd: 107
Host info
137.34.213.189.in-addr.arpa domain name pointer 189-213-34-137.static.axtel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.34.213.189.in-addr.arpa	name = 189-213-34-137.static.axtel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.222.74.221 attack
Jul 15 05:27:00 sshgateway sshd\[2712\]: Invalid user admin from 114.222.74.221
Jul 15 05:27:00 sshgateway sshd\[2712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.222.74.221
Jul 15 05:27:01 sshgateway sshd\[2712\]: Failed password for invalid user admin from 114.222.74.221 port 48591 ssh2
2019-07-15 14:16:45
37.49.225.219 attack
2019-07-13 15:48:55 -> 2019-07-14 23:03:40 : 1268 login attempts (37.49.225.219)
2019-07-15 14:32:06
84.201.134.30 attackspambots
Wordpress Admin Login attack
2019-07-15 13:48:47
198.108.66.208 attackspam
Attempts against Pop3/IMAP
2019-07-15 14:06:50
139.219.10.63 attackbotsspam
Jul 15 06:43:48 localhost sshd\[60944\]: Invalid user ubuntu from 139.219.10.63 port 47716
Jul 15 06:43:48 localhost sshd\[60944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.10.63
...
2019-07-15 13:58:30
211.159.160.214 attackspam
Jul  8 05:53:27 rb06 sshd[8477]: Failed password for invalid user user from 211.159.160.214 port 33880 ssh2
Jul  8 05:53:27 rb06 sshd[8477]: Received disconnect from 211.159.160.214: 11: Bye Bye [preauth]
Jul  8 05:55:39 rb06 sshd[3044]: Failed password for invalid user ghostname from 211.159.160.214 port 53424 ssh2
Jul  8 05:55:39 rb06 sshd[3044]: Received disconnect from 211.159.160.214: 11: Bye Bye [preauth]
Jul  8 05:57:29 rb06 sshd[7678]: Failed password for invalid user nagios from 211.159.160.214 port 42520 ssh2
Jul  8 05:57:29 rb06 sshd[7678]: Received disconnect from 211.159.160.214: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=211.159.160.214
2019-07-15 13:44:05
113.172.25.64 attackspambots
2019-07-14T18:04:20.993903mizuno.rwx.ovh sshd[32747]: Connection from 113.172.25.64 port 50963 on 78.46.61.178 port 22
2019-07-14T18:04:23.824237mizuno.rwx.ovh sshd[32747]: Invalid user admin from 113.172.25.64 port 50963
2019-07-14T18:04:23.831300mizuno.rwx.ovh sshd[32747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.25.64
2019-07-14T18:04:20.993903mizuno.rwx.ovh sshd[32747]: Connection from 113.172.25.64 port 50963 on 78.46.61.178 port 22
2019-07-14T18:04:23.824237mizuno.rwx.ovh sshd[32747]: Invalid user admin from 113.172.25.64 port 50963
2019-07-14T18:04:25.678425mizuno.rwx.ovh sshd[32747]: Failed password for invalid user admin from 113.172.25.64 port 50963 ssh2
...
2019-07-15 14:24:09
122.199.225.53 attackbots
Jul 15 06:44:22 debian sshd\[19484\]: Invalid user amandabackup from 122.199.225.53 port 37154
Jul 15 06:44:22 debian sshd\[19484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.199.225.53
...
2019-07-15 13:50:31
159.65.149.131 attackspam
SSH Brute-Force reported by Fail2Ban
2019-07-15 14:16:13
118.185.32.18 attackspam
Jul 15 01:37:11 plusreed sshd[8031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.185.32.18  user=vmail
Jul 15 01:37:14 plusreed sshd[8031]: Failed password for vmail from 118.185.32.18 port 31180 ssh2
...
2019-07-15 13:45:04
181.192.75.235 attack
15.07.2019 01:59:01 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2019-07-15 13:47:39
123.152.151.219 attackbots
Automatic report - Port Scan Attack
2019-07-15 14:28:40
166.111.7.104 attackspam
Jul 15 08:09:00 localhost sshd\[9339\]: Invalid user unix from 166.111.7.104 port 50153
Jul 15 08:09:00 localhost sshd\[9339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.7.104
Jul 15 08:09:02 localhost sshd\[9339\]: Failed password for invalid user unix from 166.111.7.104 port 50153 ssh2
2019-07-15 14:22:50
139.198.120.96 attack
Jul 15 02:15:01 meumeu sshd[4017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.120.96 
Jul 15 02:15:02 meumeu sshd[4017]: Failed password for invalid user ubuntu from 139.198.120.96 port 40068 ssh2
Jul 15 02:20:35 meumeu sshd[5150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.120.96 
...
2019-07-15 14:10:37
153.36.240.126 attackspam
Jul 15 07:47:19 legacy sshd[24876]: Failed password for root from 153.36.240.126 port 19967 ssh2
Jul 15 07:47:32 legacy sshd[24881]: Failed password for root from 153.36.240.126 port 48717 ssh2
...
2019-07-15 14:03:15

Recently Reported IPs

47.1.251.137 47.146.26.204 133.219.218.104 208.11.115.25
35.197.28.92 160.13.82.179 233.170.182.104 116.97.93.135
255.124.44.151 42.173.33.60 119.136.18.22 2.171.113.119
76.117.172.219 184.196.8.103 86.80.215.119 49.63.114.219
187.101.27.37 43.7.173.108 191.22.166.76 186.137.132.92