Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Prague

Region: Hlavní město Praha

Country: Czechia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.212.134.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.212.134.56.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010301 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 04 11:54:42 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 56.134.212.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.134.212.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.28.109.188 attackbotsspam
Aug 29 16:12:32 ip106 sshd[11518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.28.109.188 
Aug 29 16:12:34 ip106 sshd[11518]: Failed password for invalid user francisc from 120.28.109.188 port 42486 ssh2
...
2020-08-30 01:56:41
191.54.83.191 attack
1598702809 - 08/29/2020 14:06:49 Host: 191.54.83.191/191.54.83.191 Port: 445 TCP Blocked
2020-08-30 01:27:11
45.129.33.14 attack
Port scan: Attack repeated for 24 hours
2020-08-30 01:46:49
104.131.167.107 attack
Aug 29 13:42:30 mail2 sshd[170300]: Invalid user svn from 104.131.167.107 port 44138
Aug 29 13:43:20 mail2 sshd[170302]: Invalid user hua from 104.131.167.107 port 49138
Aug 29 13:44:11 mail2 sshd[170304]: Invalid user superuser from 104.131.167.107 port 54138
Aug 29 13:45:01 mail2 sshd[170308]: Invalid user zam from 104.131.167.107 port 59138
Aug 29 13:45:51 mail2 sshd[170310]: Invalid user dnjenga from 104.131.167.107 port 35906
...
2020-08-30 01:30:07
114.119.163.4 attack
[Sat Aug 29 19:06:48.719056 2020] [:error] [pid 14205:tid 139817367504640] [client 114.119.163.4:2970] [client 114.119.163.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/agroklimatologi/kalender-tanam/1528-kalender-tanam-katam-terpadu-pulau-jawa/kalender-tanam-katam-terpadu-provinsi-jawa-timur/kalender-tanam-katam-terpadu-kabupaten-tranggalek"] [unique_id "X0pE2Mn7VYhmitREAl4agwAAARA"]
...
2020-08-30 01:29:40
142.93.195.249 attackbotsspam
Aug 29 13:07:32 mail sshd\[44509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.249  user=root
...
2020-08-30 01:59:29
192.3.247.10 attackspambots
$f2bV_matches
2020-08-30 01:55:29
138.197.105.79 attackspambots
SSH Bruteforce Attempt on Honeypot
2020-08-30 01:44:17
51.15.214.21 attackbotsspam
Aug 29 18:22:44 dhoomketu sshd[2746650]: Invalid user testuser from 51.15.214.21 port 34270
Aug 29 18:22:44 dhoomketu sshd[2746650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.214.21 
Aug 29 18:22:44 dhoomketu sshd[2746650]: Invalid user testuser from 51.15.214.21 port 34270
Aug 29 18:22:47 dhoomketu sshd[2746650]: Failed password for invalid user testuser from 51.15.214.21 port 34270 ssh2
Aug 29 18:26:18 dhoomketu sshd[2746787]: Invalid user yyk from 51.15.214.21 port 40890
...
2020-08-30 01:36:45
111.229.242.156 attack
Aug 29 15:54:53 lukav-desktop sshd\[13645\]: Invalid user konstantin from 111.229.242.156
Aug 29 15:54:53 lukav-desktop sshd\[13645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.242.156
Aug 29 15:54:55 lukav-desktop sshd\[13645\]: Failed password for invalid user konstantin from 111.229.242.156 port 35210 ssh2
Aug 29 16:02:03 lukav-desktop sshd\[13693\]: Invalid user ams from 111.229.242.156
Aug 29 16:02:03 lukav-desktop sshd\[13693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.242.156
2020-08-30 01:31:44
123.6.51.133 attack
Aug 29 12:06:09 *** sshd[29353]: Invalid user user2 from 123.6.51.133
2020-08-30 01:49:00
3.82.223.206 attackbots
Fail2Ban Ban Triggered
2020-08-30 01:23:42
18.18.248.17 attack
SQL Injection (attack)
2020-08-30 01:57:18
45.129.33.16 attack
 TCP (SYN) 45.129.33.16:57133 -> port 17181, len 44
2020-08-30 01:42:41
14.39.25.114 attackspam
Port probing on unauthorized port 5555
2020-08-30 01:21:56

Recently Reported IPs

41.232.199.191 200.46.209.163 221.170.156.241 155.176.97.96
57.135.217.127 166.47.243.74 97.176.102.168 159.244.146.82
206.225.209.141 154.45.129.12 219.202.223.145 183.116.133.16
148.215.143.169 101.19.66.0 87.229.34.53 136.236.36.165
173.135.135.189 89.228.202.212 135.13.162.186 134.165.39.233