Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.134.122.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.134.122.84.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:04:38 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 84.122.134.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 84.122.134.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.52.78 attack
Sep 15 02:11:20 ny01 sshd[29156]: Failed password for root from 222.186.52.78 port 38400 ssh2
Sep 15 02:11:22 ny01 sshd[29156]: Failed password for root from 222.186.52.78 port 38400 ssh2
Sep 15 02:12:15 ny01 sshd[29315]: Failed password for root from 222.186.52.78 port 22073 ssh2
2019-09-15 14:14:44
80.211.249.177 attack
Sep 14 19:35:41 auw2 sshd\[12353\]: Invalid user meres from 80.211.249.177
Sep 14 19:35:41 auw2 sshd\[12353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.249.177
Sep 14 19:35:43 auw2 sshd\[12353\]: Failed password for invalid user meres from 80.211.249.177 port 60742 ssh2
Sep 14 19:39:23 auw2 sshd\[12825\]: Invalid user qo from 80.211.249.177
Sep 14 19:39:23 auw2 sshd\[12825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.249.177
2019-09-15 13:55:52
178.128.21.45 attackbotsspam
Sep 14 19:19:38 hanapaa sshd\[6719\]: Invalid user guest from 178.128.21.45
Sep 14 19:19:38 hanapaa sshd\[6719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.45
Sep 14 19:19:40 hanapaa sshd\[6719\]: Failed password for invalid user guest from 178.128.21.45 port 36728 ssh2
Sep 14 19:24:44 hanapaa sshd\[7142\]: Invalid user ib from 178.128.21.45
Sep 14 19:24:44 hanapaa sshd\[7142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.45
2019-09-15 13:29:17
200.209.174.76 attack
Sep 14 17:38:38 web9 sshd\[21324\]: Invalid user susana from 200.209.174.76
Sep 14 17:38:38 web9 sshd\[21324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.174.76
Sep 14 17:38:40 web9 sshd\[21324\]: Failed password for invalid user susana from 200.209.174.76 port 33644 ssh2
Sep 14 17:43:44 web9 sshd\[22270\]: Invalid user ssms from 200.209.174.76
Sep 14 17:43:44 web9 sshd\[22270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.174.76
2019-09-15 13:29:40
181.48.68.54 attackbots
Sep 15 06:37:13 ArkNodeAT sshd\[4442\]: Invalid user user1 from 181.48.68.54
Sep 15 06:37:13 ArkNodeAT sshd\[4442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.68.54
Sep 15 06:37:15 ArkNodeAT sshd\[4442\]: Failed password for invalid user user1 from 181.48.68.54 port 60368 ssh2
2019-09-15 13:26:01
221.150.17.93 attackspam
Sep 14 19:49:14 lcprod sshd\[16843\]: Invalid user wxl from 221.150.17.93
Sep 14 19:49:14 lcprod sshd\[16843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.150.17.93
Sep 14 19:49:16 lcprod sshd\[16843\]: Failed password for invalid user wxl from 221.150.17.93 port 49040 ssh2
Sep 14 19:54:14 lcprod sshd\[17274\]: Invalid user lili from 221.150.17.93
Sep 14 19:54:14 lcprod sshd\[17274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.150.17.93
2019-09-15 14:06:12
182.72.162.2 attackspambots
Automated report - ssh fail2ban:
Sep 15 07:05:25 authentication failure 
Sep 15 07:05:27 wrong password, user=join, port=10000, ssh2
Sep 15 07:09:57 authentication failure
2019-09-15 14:16:30
138.68.4.175 attackspambots
Sep 15 07:04:17 tux-35-217 sshd\[11717\]: Invalid user a from 138.68.4.175 port 56004
Sep 15 07:04:17 tux-35-217 sshd\[11717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.175
Sep 15 07:04:20 tux-35-217 sshd\[11717\]: Failed password for invalid user a from 138.68.4.175 port 56004 ssh2
Sep 15 07:08:41 tux-35-217 sshd\[11750\]: Invalid user administrator from 138.68.4.175 port 43480
Sep 15 07:08:41 tux-35-217 sshd\[11750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.175
...
2019-09-15 13:27:07
137.74.159.147 attack
Sep 15 07:08:28 tuotantolaitos sshd[3325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.159.147
Sep 15 07:08:30 tuotantolaitos sshd[3325]: Failed password for invalid user webmaster from 137.74.159.147 port 33988 ssh2
...
2019-09-15 13:46:52
192.241.159.27 attack
$f2bV_matches
2019-09-15 13:46:12
196.219.173.109 attackbotsspam
Invalid user teamspeak3 from 196.219.173.109 port 37876
2019-09-15 13:18:51
140.143.45.22 attackspambots
Sep 15 01:45:00 ny01 sshd[23511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.45.22
Sep 15 01:45:02 ny01 sshd[23511]: Failed password for invalid user xiao from 140.143.45.22 port 40722 ssh2
Sep 15 01:50:56 ny01 sshd[24704]: Failed password for root from 140.143.45.22 port 54880 ssh2
2019-09-15 13:53:16
182.139.134.107 attackspam
2019-09-15T05:18:56.421689abusebot-2.cloudsearch.cf sshd\[17630\]: Invalid user agnetti from 182.139.134.107 port 19009
2019-09-15 13:50:17
139.99.62.10 attack
Sep 15 07:37:17 vps647732 sshd[14868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10
Sep 15 07:37:19 vps647732 sshd[14868]: Failed password for invalid user q2w3e4R from 139.99.62.10 port 51936 ssh2
...
2019-09-15 13:50:48
128.199.118.27 attackbotsspam
Sep 15 00:25:38 vps200512 sshd\[24190\]: Invalid user enterprise from 128.199.118.27
Sep 15 00:25:38 vps200512 sshd\[24190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.118.27
Sep 15 00:25:40 vps200512 sshd\[24190\]: Failed password for invalid user enterprise from 128.199.118.27 port 54620 ssh2
Sep 15 00:30:46 vps200512 sshd\[24248\]: Invalid user eh from 128.199.118.27
Sep 15 00:30:46 vps200512 sshd\[24248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.118.27
2019-09-15 14:11:50

Recently Reported IPs

247.141.99.25 26.194.112.249 123.230.191.252 145.224.200.177
23.169.204.182 67.33.134.86 236.222.195.62 33.62.147.54
15.19.173.250 13.40.175.160 44.157.156.202 66.20.130.248
233.175.3.239 161.180.21.238 245.219.128.115 165.30.75.104
115.249.126.212 254.189.133.72 116.240.150.161 212.83.117.15