Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.61.214.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3509
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.61.214.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:14:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 134.214.61.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.214.61.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.77.167.35 attackspambots
Automatic report - Banned IP Access
2019-08-08 13:24:21
1.252.42.102 attackbotsspam
Bruteforce on SSH Honeypot
2019-08-08 13:44:36
192.169.216.126 attack
POP
2019-08-08 13:16:44
68.183.218.185 attackspambots
Aug  8 02:21:35 thevastnessof sshd[3310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.218.185
...
2019-08-08 13:55:31
14.43.82.242 attackspambots
Automatic report - Banned IP Access
2019-08-08 13:56:45
187.217.206.202 attackspam
Aug  8 04:11:34 mxgate1 postfix/postscreen[7814]: CONNECT from [187.217.206.202]:41291 to [176.31.12.44]:25
Aug  8 04:11:34 mxgate1 postfix/dnsblog[7926]: addr 187.217.206.202 listed by domain zen.spamhaus.org as 127.0.0.4
Aug  8 04:11:34 mxgate1 postfix/dnsblog[7927]: addr 187.217.206.202 listed by domain cbl.abuseat.org as 127.0.0.2
Aug  8 04:11:34 mxgate1 postfix/dnsblog[7923]: addr 187.217.206.202 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Aug  8 04:11:34 mxgate1 postfix/dnsblog[7924]: addr 187.217.206.202 listed by domain b.barracudacentral.org as 127.0.0.2
Aug  8 04:11:40 mxgate1 postfix/postscreen[7814]: DNSBL rank 5 for [187.217.206.202]:41291
Aug x@x
Aug  8 04:11:41 mxgate1 postfix/postscreen[7814]: HANGUP after 0.68 from [187.217.206.202]:41291 in tests after SMTP handshake
Aug  8 04:11:41 mxgate1 postfix/postscreen[7814]: DISCONNECT [187.217.206.202]:41291


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.217.206.202
2019-08-08 14:07:59
45.73.12.218 attackspambots
Aug  8 08:06:11 yabzik sshd[26253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.73.12.218
Aug  8 08:06:12 yabzik sshd[26253]: Failed password for invalid user alan from 45.73.12.218 port 33308 ssh2
Aug  8 08:10:55 yabzik sshd[27835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.73.12.218
2019-08-08 14:17:54
106.75.141.202 attackspambots
Aug  8 00:54:43 TORMINT sshd\[7862\]: Invalid user martin from 106.75.141.202
Aug  8 00:54:43 TORMINT sshd\[7862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.202
Aug  8 00:54:45 TORMINT sshd\[7862\]: Failed password for invalid user martin from 106.75.141.202 port 44520 ssh2
...
2019-08-08 13:43:08
153.36.138.52 attackbotsspam
Aug  8 02:22:55   DDOS Attack: SRC=153.36.138.52 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=47  DF PROTO=TCP SPT=5921 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-08-08 13:23:30
110.35.79.23 attackbots
Invalid user victoria from 110.35.79.23 port 53979
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23
Failed password for invalid user victoria from 110.35.79.23 port 53979 ssh2
Invalid user rapha from 110.35.79.23 port 51481
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23
2019-08-08 13:14:30
134.175.62.14 attackbots
SSH bruteforce
2019-08-08 13:40:11
27.255.77.5 attackspambots
2019-08-07 21:22:16 dovecot_login authenticator failed for (LdOEh4) [27.255.77.5]:65343 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=willie@lerctr.org)
2019-08-07 21:22:33 dovecot_login authenticator failed for (Hf2dkQ5HK) [27.255.77.5]:62094 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=willie@lerctr.org)
2019-08-07 21:22:54 dovecot_login authenticator failed for (D3AHrk) [27.255.77.5]:64033 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=willie@lerctr.org)
...
2019-08-08 13:26:57
208.64.33.123 attackspambots
Automatic report - Banned IP Access
2019-08-08 14:14:01
119.82.73.186 attack
Aug  8 04:16:06 minden010 sshd[9341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.82.73.186
Aug  8 04:16:08 minden010 sshd[9341]: Failed password for invalid user vi from 119.82.73.186 port 57082 ssh2
Aug  8 04:21:25 minden010 sshd[11184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.82.73.186
...
2019-08-08 14:05:08
185.220.101.27 attackbots
Bruteforce on SSH Honeypot
2019-08-08 13:45:56

Recently Reported IPs

205.146.27.23 140.155.68.38 185.42.175.139 73.87.83.188
4.173.176.23 48.164.120.130 83.41.120.37 137.248.111.157
177.83.241.177 254.3.35.244 249.134.108.106 30.86.242.160
241.46.109.137 215.124.230.27 233.239.117.167 148.41.194.164
19.143.165.15 208.110.18.87 237.39.18.139 213.250.38.62