Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.128.19.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50036
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.128.19.134.			IN	A

;; AUTHORITY SECTION:
.			277	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070400 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 04 23:45:50 CST 2020
;; MSG SIZE  rcvd: 116
Host info
134.19.128.2.in-addr.arpa domain name pointer 002128019134.mbb.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.19.128.2.in-addr.arpa	name = 002128019134.mbb.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.105.78 attack
Oct  8 17:54:07 MK-Soft-Root2 sshd[5519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.78 
Oct  8 17:54:09 MK-Soft-Root2 sshd[5519]: Failed password for invalid user 1@3$qWeR from 182.61.105.78 port 52694 ssh2
...
2019-10-09 03:30:18
106.38.35.218 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-09 03:07:41
51.255.168.30 attackbotsspam
Oct  1 06:23:44 dallas01 sshd[16379]: Failed password for invalid user de12345 from 51.255.168.30 port 37220 ssh2
Oct  1 06:27:41 dallas01 sshd[17046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.30
Oct  1 06:27:43 dallas01 sshd[17046]: Failed password for invalid user shao from 51.255.168.30 port 49126 ssh2
Oct  1 06:31:33 dallas01 sshd[17639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.30
2019-10-09 03:13:47
178.32.211.153 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-10-09 03:22:58
51.75.64.96 attack
2019-10-08T08:53:19.044822ns525875 sshd\[11009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.ip-51-75-64.eu  user=root
2019-10-08T08:53:21.170579ns525875 sshd\[11009\]: Failed password for root from 51.75.64.96 port 60984 ssh2
2019-10-08T08:57:16.944109ns525875 sshd\[15841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.ip-51-75-64.eu  user=root
2019-10-08T08:57:18.271552ns525875 sshd\[15841\]: Failed password for root from 51.75.64.96 port 44982 ssh2
...
2019-10-09 03:29:52
27.136.5.79 attack
Unauthorised access (Oct  8) SRC=27.136.5.79 LEN=40 TTL=47 ID=29353 TCP DPT=8080 WINDOW=27073 SYN 
Unauthorised access (Oct  7) SRC=27.136.5.79 LEN=40 TTL=47 ID=65119 TCP DPT=8080 WINDOW=20551 SYN 
Unauthorised access (Oct  7) SRC=27.136.5.79 LEN=40 TTL=47 ID=14553 TCP DPT=8080 WINDOW=27073 SYN 
Unauthorised access (Oct  6) SRC=27.136.5.79 LEN=40 TTL=47 ID=19698 TCP DPT=8080 WINDOW=15171 SYN 
Unauthorised access (Oct  6) SRC=27.136.5.79 LEN=40 TTL=47 ID=27231 TCP DPT=8080 WINDOW=27073 SYN
2019-10-09 03:36:06
182.74.25.246 attack
Failed password for root from 182.74.25.246 port 43580 ssh2
2019-10-09 03:12:49
85.105.156.98 attack
Automatic report - Port Scan Attack
2019-10-09 03:16:33
217.11.183.58 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-09 03:00:30
142.112.115.160 attackspam
2019-10-08T12:23:40.8994561495-001 sshd\[22036\]: Failed password for invalid user Losenord3@1 from 142.112.115.160 port 44117 ssh2
2019-10-08T12:35:30.6144041495-001 sshd\[22945\]: Invalid user Passw0rt123 from 142.112.115.160 port 53176
2019-10-08T12:35:30.6216191495-001 sshd\[22945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ipagstaticip-f6ffd4e0-f46a-b142-b2ad-b6c2b58e2418.sdsl.bell.ca
2019-10-08T12:35:32.5752781495-001 sshd\[22945\]: Failed password for invalid user Passw0rt123 from 142.112.115.160 port 53176 ssh2
2019-10-08T12:39:21.0441691495-001 sshd\[23170\]: Invalid user Adventure@2017 from 142.112.115.160 port 36937
2019-10-08T12:39:21.0481561495-001 sshd\[23170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ipagstaticip-f6ffd4e0-f46a-b142-b2ad-b6c2b58e2418.sdsl.bell.ca
...
2019-10-09 03:05:36
175.145.192.241 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-09 03:04:41
103.14.96.241 attack
Oct  8 17:37:49 work-partkepr sshd\[17718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.96.241  user=root
Oct  8 17:37:52 work-partkepr sshd\[17718\]: Failed password for root from 103.14.96.241 port 54156 ssh2
...
2019-10-09 03:30:42
5.55.101.150 attackbots
port scan and connect, tcp 23 (telnet)
2019-10-09 03:28:29
91.207.40.42 attackbots
scan r
2019-10-09 03:05:12
37.49.225.93 attack
Oct  8 21:16:48 icinga sshd[1355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.225.93 
Oct  8 21:16:50 icinga sshd[1355]: Failed password for invalid user admin from 37.49.225.93 port 32721 ssh2
Oct  8 21:16:51 icinga sshd[1355]: error: Received disconnect from 37.49.225.93 port 32721:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2019-10-09 03:18:30

Recently Reported IPs

143.0.166.93 51.178.9.174 182.43.158.63 85.26.151.114
4.149.12.194 193.181.190.218 186.176.138.190 84.19.188.189
177.233.87.33 192.92.74.129 119.96.120.113 184.159.130.140
51.158.119.229 193.228.91.110 194.165.38.124 117.69.190.180
206.189.142.222 168.62.177.100 176.96.74.220 184.168.27.122