Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kazakhstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.134.140.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7609
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.134.140.141.			IN	A

;; AUTHORITY SECTION:
.			114	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 00:27:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
141.140.134.2.in-addr.arpa domain name pointer 2.134.140.141.megaline.telecom.kz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.140.134.2.in-addr.arpa	name = 2.134.140.141.megaline.telecom.kz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.108.66.208 attack
Unauthorized connection attempt detected from IP address 198.108.66.208 to port 443
2020-04-15 12:43:56
144.76.38.10 attackspambots
Reported bad bot @ 2020-04-15 05:00:01
2020-04-15 12:08:00
138.197.36.189 attackbots
Apr 15 00:14:48 ny01 sshd[15449]: Failed password for root from 138.197.36.189 port 37008 ssh2
Apr 15 00:18:21 ny01 sshd[15897]: Failed password for root from 138.197.36.189 port 45124 ssh2
2020-04-15 12:39:11
120.132.106.82 attackspam
$f2bV_matches
2020-04-15 12:41:39
218.92.0.168 attackbots
Apr 15 06:04:38 * sshd[30723]: Failed password for root from 218.92.0.168 port 20710 ssh2
Apr 15 06:04:50 * sshd[30723]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 20710 ssh2 [preauth]
2020-04-15 12:29:26
139.199.159.77 attackspambots
Invalid user git from 139.199.159.77 port 42534
2020-04-15 12:25:04
77.55.237.245 attack
Apr 14 18:13:00 web9 sshd\[23674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.237.245  user=root
Apr 14 18:13:02 web9 sshd\[23674\]: Failed password for root from 77.55.237.245 port 53890 ssh2
Apr 14 18:17:04 web9 sshd\[24290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.237.245  user=root
Apr 14 18:17:05 web9 sshd\[24290\]: Failed password for root from 77.55.237.245 port 34992 ssh2
Apr 14 18:20:50 web9 sshd\[24840\]: Invalid user musicyxy from 77.55.237.245
2020-04-15 12:30:12
222.186.52.39 attackbots
Apr 15 06:07:41 * sshd[31290]: Failed password for root from 222.186.52.39 port 16840 ssh2
Apr 15 06:07:43 * sshd[31290]: Failed password for root from 222.186.52.39 port 16840 ssh2
2020-04-15 12:16:58
205.185.124.153 attack
Invalid user fake from 205.185.124.153 port 53014
2020-04-15 12:01:34
167.71.254.95 attack
Apr 15 11:02:15 itv-usvr-01 sshd[21761]: Invalid user flw from 167.71.254.95
2020-04-15 12:28:12
78.46.161.81 attack
Reported bad bot @ 2020-04-15 05:00:01
2020-04-15 12:05:45
128.199.85.64 attack
odoo8
...
2020-04-15 12:42:44
80.211.35.87 attack
Apr 15 05:55:04 * sshd[29254]: Failed password for root from 80.211.35.87 port 53092 ssh2
2020-04-15 12:31:55
13.66.250.75 attack
Apr 15 03:27:34 XXX sshd[23778]: Invalid user test from 13.66.250.75 port 47660
2020-04-15 12:11:41
185.58.226.235 attack
Wordpress malicious attack:[sshd]
2020-04-15 12:13:21

Recently Reported IPs

123.10.17.4 45.6.230.181 110.12.15.125 201.150.184.98
186.33.93.29 95.52.99.126 189.213.230.96 125.45.58.26
137.184.115.179 106.12.72.3 89.228.205.104 177.133.30.50
118.180.51.132 139.198.187.210 89.218.5.110 45.190.158.186
139.162.201.203 190.90.102.34 36.85.35.248 75.129.185.147