Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.134.100.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28842
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.134.100.42.			IN	A

;; AUTHORITY SECTION:
.			585	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010900 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 16:31:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.100.134.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.100.134.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.98.94.51 attackbots
Automatic report - Port Scan Attack
2019-08-27 07:10:44
104.236.224.69 attack
Aug 26 19:59:06 cvbmail sshd\[7412\]: Invalid user somsak from 104.236.224.69
Aug 26 19:59:06 cvbmail sshd\[7412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.224.69
Aug 26 19:59:08 cvbmail sshd\[7412\]: Failed password for invalid user somsak from 104.236.224.69 port 58993 ssh2
2019-08-27 07:04:57
54.39.151.167 attack
Aug 27 01:17:17 rpi sshd[7642]: Failed password for sshd from 54.39.151.167 port 35878 ssh2
Aug 27 01:17:21 rpi sshd[7642]: Failed password for sshd from 54.39.151.167 port 35878 ssh2
2019-08-27 07:24:01
129.144.156.96 attack
Aug 26 17:28:34 dev0-dcfr-rnet sshd[30439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.156.96
Aug 26 17:28:37 dev0-dcfr-rnet sshd[30439]: Failed password for invalid user okilab from 129.144.156.96 port 59315 ssh2
Aug 26 17:33:03 dev0-dcfr-rnet sshd[30485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.156.96
2019-08-27 07:38:39
61.130.54.2 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-27 07:29:22
167.99.200.84 attack
2019-08-27T01:25:04.871614stark.klein-stark.info sshd\[14285\]: Invalid user allan from 167.99.200.84 port 36800
2019-08-27T01:25:04.875160stark.klein-stark.info sshd\[14285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.200.84
2019-08-27T01:25:07.445335stark.klein-stark.info sshd\[14285\]: Failed password for invalid user allan from 167.99.200.84 port 36800 ssh2
...
2019-08-27 07:28:28
222.124.16.227 attack
Aug 26 19:19:25 XXXXXX sshd[25893]: Invalid user petrella from 222.124.16.227 port 40594
2019-08-27 07:13:59
125.88.186.65 attackbots
Aug 26 22:46:53 ip-172-31-62-245 sshd\[31702\]: Invalid user amit from 125.88.186.65\
Aug 26 22:46:55 ip-172-31-62-245 sshd\[31702\]: Failed password for invalid user amit from 125.88.186.65 port 56278 ssh2\
Aug 26 22:51:41 ip-172-31-62-245 sshd\[31713\]: Invalid user rtkid from 125.88.186.65\
Aug 26 22:51:42 ip-172-31-62-245 sshd\[31713\]: Failed password for invalid user rtkid from 125.88.186.65 port 43788 ssh2\
Aug 26 22:56:24 ip-172-31-62-245 sshd\[31726\]: Invalid user admin from 125.88.186.65\
2019-08-27 07:35:11
120.52.121.86 attackbotsspam
Aug 27 00:22:06 ubuntu-2gb-nbg1-dc3-1 sshd[28856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.121.86
Aug 27 00:22:08 ubuntu-2gb-nbg1-dc3-1 sshd[28856]: Failed password for invalid user myworkingcrack from 120.52.121.86 port 56677 ssh2
...
2019-08-27 07:14:20
209.235.67.48 attack
Aug 26 05:55:04 hcbb sshd\[24778\]: Invalid user nelson from 209.235.67.48
Aug 26 05:55:04 hcbb sshd\[24778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.48
Aug 26 05:55:06 hcbb sshd\[24778\]: Failed password for invalid user nelson from 209.235.67.48 port 34043 ssh2
Aug 26 05:59:20 hcbb sshd\[25124\]: Invalid user amazon from 209.235.67.48
Aug 26 05:59:20 hcbb sshd\[25124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.48
2019-08-27 07:03:47
81.30.203.70 attackspambots
SSH Brute Force, server-1 sshd[6764]: Failed password for invalid user teamspeak-server from 81.30.203.70 port 42526 ssh2
2019-08-27 07:08:56
119.187.25.211 attackspambots
Aug 26 14:38:04 linuxrulz sshd[25847]: Invalid user mis from 119.187.25.211 port 55160
Aug 26 14:38:04 linuxrulz sshd[25847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.187.25.211
Aug 26 14:38:07 linuxrulz sshd[25847]: Failed password for invalid user mis from 119.187.25.211 port 55160 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.187.25.211
2019-08-27 07:16:43
61.224.67.188 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-27 07:42:29
43.226.40.41 attack
Aug 26 17:39:31 MK-Soft-VM7 sshd\[26813\]: Invalid user webuser from 43.226.40.41 port 56126
Aug 26 17:39:31 MK-Soft-VM7 sshd\[26813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.40.41
Aug 26 17:39:34 MK-Soft-VM7 sshd\[26813\]: Failed password for invalid user webuser from 43.226.40.41 port 56126 ssh2
...
2019-08-27 07:09:23
118.25.124.210 attack
Aug 26 13:12:46 web9 sshd\[10836\]: Invalid user hadoop from 118.25.124.210
Aug 26 13:12:46 web9 sshd\[10836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.124.210
Aug 26 13:12:48 web9 sshd\[10836\]: Failed password for invalid user hadoop from 118.25.124.210 port 51180 ssh2
Aug 26 13:17:14 web9 sshd\[11631\]: Invalid user fg from 118.25.124.210
Aug 26 13:17:14 web9 sshd\[11631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.124.210
2019-08-27 07:22:29

Recently Reported IPs

142.238.9.82 76.102.228.219 152.232.106.162 91.47.188.0
227.161.185.186 161.180.91.80 46.89.198.137 125.212.176.210
88.134.182.210 15.214.136.1 67.213.51.34 104.232.76.246
118.42.87.175 51.137.128.138 19.62.92.11 115.132.162.159
21.124.93.145 197.237.208.174 44.110.68.248 10.168.73.13