Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Curitiba

Region: Parana

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: Fundacao da UFPR para o DCTC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.134.22.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16485
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.134.22.136.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 24 22:39:52 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 136.22.134.200.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 136.22.134.200.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
3.126.205.6 attack
Brute force attack against VPN service
2020-03-10 16:19:40
202.225.167.249 attackspam
23/tcp
[2020-03-10]1pkt
2020-03-10 16:18:38
209.58.157.95 attackbots
(From eric@talkwithwebvisitor.com) Cool website!

My name’s Eric, and I just found your site - drstopa.com - while surfing the net. You showed up at the top of the search results, so I checked you out. Looks like what you’re doing is pretty cool.
 
But if you don’t mind me asking – after someone like me stumbles across drstopa.com, what usually happens?

Is your site generating leads for your business? 
 
I’m guessing some, but I also bet you’d like more… studies show that 7 out 10 who land on a site wind up leaving without a trace.

Not good.

Here’s a thought – what if there was an easy way for every visitor to “raise their hand” to get a phone call from you INSTANTLY… the second they hit your site and said, “call me now.”

You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It lets you know IMMEDIATELY – so that you can talk to that lead while they’re literally looking over your site.

CLI
2020-03-10 16:06:51
116.75.43.27 attackspambots
unauthorized connection attempt
2020-03-10 16:33:02
123.22.113.37 attackspam
Email rejected due to spam filtering
2020-03-10 16:30:41
63.82.48.105 attackspam
Mar 10 04:30:01 mail.srvfarm.net postfix/smtpd[332670]: NOQUEUE: reject: RCPT from unknown[63.82.48.105]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 04:32:12 mail.srvfarm.net postfix/smtpd[332213]: NOQUEUE: reject: RCPT from unknown[63.82.48.105]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 04:32:41 mail.srvfarm.net postfix/smtpd[332665]: NOQUEUE: reject: RCPT from unknown[63.82.48.105]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 04:32:41 mail.srvfarm.net postfix/smtpd[332771]: NOQUEUE: reject: RCPT from unknown[63.82.48.105]: 450 4.1.8 : Sender address r
2020-03-10 15:53:57
103.141.253.2 attackbotsspam
Email rejected due to spam filtering
2020-03-10 16:03:49
43.230.196.210 attackspambots
Email spam message
2020-03-10 16:24:45
202.83.10.18 attackspambots
Mar  9 19:23:31 server sshd\[16260\]: Failed password for root from 202.83.10.18 port 44150 ssh2
Mar 10 07:16:56 server sshd\[8873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.10.18  user=root
Mar 10 07:16:58 server sshd\[8873\]: Failed password for root from 202.83.10.18 port 38236 ssh2
Mar 10 07:22:16 server sshd\[9910\]: Invalid user radio from 202.83.10.18
Mar 10 07:22:16 server sshd\[9910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.10.18 
...
2020-03-10 15:49:47
49.235.97.29 attackspambots
2020-03-10T01:52:54.626701linuxbox-skyline sshd[77084]: Invalid user magento from 49.235.97.29 port 43429
...
2020-03-10 16:23:06
63.82.48.169 attackspambots
Mar 10 05:30:12 mail.srvfarm.net postfix/smtpd[353330]: NOQUEUE: reject: RCPT from unknown[63.82.48.169]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 05:31:43 mail.srvfarm.net postfix/smtpd[352802]: NOQUEUE: reject: RCPT from unknown[63.82.48.169]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 05:31:43 mail.srvfarm.net postfix/smtpd[353062]: NOQUEUE: reject: RCPT from unknown[63.82.48.169]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 05:31:43 mail.srvfarm.net postfix/smtpd[353110]: NOQUEUE: reject: RCPT from unknown[63.82.48.169]: 450 4.1.8 : Sender address rejecte
2020-03-10 15:53:39
188.226.243.10 attackspam
Mar 10 02:42:25 lanister sshd[363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.243.10  user=root
Mar 10 02:42:28 lanister sshd[363]: Failed password for root from 188.226.243.10 port 32848 ssh2
Mar 10 02:48:06 lanister sshd[438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.243.10  user=root
Mar 10 02:48:08 lanister sshd[438]: Failed password for root from 188.226.243.10 port 33082 ssh2
2020-03-10 16:32:36
134.73.51.86 attackbotsspam
Mar 10 05:35:35 mail.srvfarm.net postfix/smtpd[353111]: NOQUEUE: reject: RCPT from unknown[134.73.51.86]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 05:37:56 mail.srvfarm.net postfix/smtpd[348869]: NOQUEUE: reject: RCPT from unknown[134.73.51.86]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 05:37:56 mail.srvfarm.net postfix/smtpd[351700]: NOQUEUE: reject: RCPT from unknown[134.73.51.86]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 05:38:28 mail.srvfarm.net postfix/smtpd[353169]: NOQUEUE: reject: RCPT from unknown[134.73.51.86]: 450 4.1.8 
2020-03-10 15:51:53
198.46.177.58 attackspam
(From eric@talkwithwebvisitor.com) Cool website!

My name’s Eric, and I just found your site - ctchiropractic.com - while surfing the net. You showed up at the top of the search results, so I checked you out. Looks like what you’re doing is pretty cool.
 
But if you don’t mind me asking – after someone like me stumbles across ctchiropractic.com, what usually happens?

Is your site generating leads for your business? 
 
I’m guessing some, but I also bet you’d like more… studies show that 7 out 10 who land on a site wind up leaving without a trace.

Not good.

Here’s a thought – what if there was an easy way for every visitor to “raise their hand” to get a phone call from you INSTANTLY… the second they hit your site and said, “call me now.”

You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It lets you know IMMEDIATELY – so that you can talk to that lead while they’re literally looking over you
2020-03-10 16:05:41
45.80.65.1 attack
Mar 10 00:36:23 server sshd\[23022\]: Failed password for invalid user tanxjian from 45.80.65.1 port 34586 ssh2
Mar 10 06:42:46 server sshd\[2276\]: Invalid user openfiler from 45.80.65.1
Mar 10 06:42:46 server sshd\[2276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1 
Mar 10 06:42:49 server sshd\[2276\]: Failed password for invalid user openfiler from 45.80.65.1 port 48380 ssh2
Mar 10 06:51:02 server sshd\[3935\]: Invalid user xguest from 45.80.65.1
Mar 10 06:51:02 server sshd\[3935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1 
...
2020-03-10 16:04:06

Recently Reported IPs

195.73.70.99 79.182.55.34 36.255.44.235 176.242.90.205
121.7.73.86 110.216.19.62 113.141.72.248 99.242.172.24
62.173.151.168 108.43.175.182 87.73.243.165 47.52.137.229
199.204.49.235 3.126.91.210 162.252.82.193 113.82.35.108
144.48.57.129 177.191.182.2 80.52.99.164 115.239.165.105