Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: Safaricom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.106.134.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.106.134.168.		IN	A

;; AUTHORITY SECTION:
.			290	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091301 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 14 08:44:55 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 168.134.106.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.134.106.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.74.71.197 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 17:34:57
45.171.124.30 attack
Unauthorized connection attempt detected from IP address 45.171.124.30 to port 23
2020-01-13 17:52:40
104.192.163.119 attack
Unauthorized connection attempt detected from IP address 104.192.163.119 to port 2220 [J]
2020-01-13 17:41:22
118.69.55.61 attackspambots
Jan 13 08:35:03 marvibiene sshd[20609]: Invalid user nagios from 118.69.55.61 port 63808
Jan 13 08:35:03 marvibiene sshd[20609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.55.61
Jan 13 08:35:03 marvibiene sshd[20609]: Invalid user nagios from 118.69.55.61 port 63808
Jan 13 08:35:05 marvibiene sshd[20609]: Failed password for invalid user nagios from 118.69.55.61 port 63808 ssh2
...
2020-01-13 17:45:03
199.19.224.191 attackbots
Fail2Ban Ban Triggered (2)
2020-01-13 17:28:17
157.245.127.128 attackspam
Unauthorized connection attempt detected from IP address 157.245.127.128 to port 2220 [J]
2020-01-13 18:03:52
37.235.71.110 attack
Unauthorized connection attempt detected from IP address 37.235.71.110 to port 83 [J]
2020-01-13 17:29:44
18.191.247.90 attackspam
RDP Bruteforce
2020-01-13 17:36:39
208.97.189.248 attackbots
xmlrpc attack
2020-01-13 17:37:42
185.156.73.54 attackspambots
01/13/2020-04:58:45.310203 185.156.73.54 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-13 18:02:11
178.128.114.21 attackbots
Unauthorized connection attempt detected from IP address 178.128.114.21 to port 2220 [J]
2020-01-13 17:50:05
85.195.52.41 attack
SSH-bruteforce attempts
2020-01-13 18:04:37
5.251.26.69 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 17:34:05
45.77.19.88 attackbots
Unauthorized connection attempt detected from IP address 45.77.19.88 to port 22
2020-01-13 18:02:56
118.70.179.63 attackbots
Unauthorised access (Jan 13) SRC=118.70.179.63 LEN=52 TTL=111 ID=13335 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-13 17:29:00

Recently Reported IPs

64.173.2.70 126.254.65.181 101.98.12.188 212.83.231.181
68.124.116.83 109.120.249.68 32.59.123.2 172.108.118.60
111.149.15.211 220.17.123.189 112.251.93.86 109.45.227.220
195.194.14.213 39.112.113.252 70.16.40.120 112.19.31.253
96.63.48.175 178.227.217.205 62.38.100.139 150.101.180.115