Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bogotá

Region: Bogota D.C.

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.31.94.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.31.94.134.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072301 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 24 07:41:44 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 134.94.31.200.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.94.31.200.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.243.158.198 attack
Nov  4 06:09:30 master sshd[32493]: Failed password for root from 162.243.158.198 port 40192 ssh2
Nov  4 06:20:29 master sshd[32561]: Failed password for root from 162.243.158.198 port 60404 ssh2
Nov  4 06:23:59 master sshd[32579]: Failed password for root from 162.243.158.198 port 40744 ssh2
Nov  4 06:27:30 master sshd[32724]: Failed password for root from 162.243.158.198 port 49312 ssh2
Nov  4 06:31:08 master sshd[581]: Failed password for invalid user install from 162.243.158.198 port 57886 ssh2
Nov  4 06:34:37 master sshd[603]: Failed password for root from 162.243.158.198 port 38240 ssh2
Nov  4 06:38:10 master sshd[625]: Failed password for invalid user trac from 162.243.158.198 port 46816 ssh2
Nov  4 06:41:49 master sshd[639]: Failed password for invalid user wpyan from 162.243.158.198 port 55404 ssh2
Nov  4 06:45:20 master sshd[674]: Failed password for root from 162.243.158.198 port 35758 ssh2
Nov  4 06:48:52 master sshd[692]: Failed password for invalid user com from 162.243.158.198 port 44334 ssh2
N
2019-11-04 21:01:24
177.45.48.252 attackbots
SSH/22 MH Probe, BF, Hack -
2019-11-04 20:56:29
51.15.84.19 attack
Nov  4 05:23:20 mail sshd\[46403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.84.19  user=root
...
2019-11-04 20:38:34
222.186.173.183 attack
Nov  4 13:38:46 nextcloud sshd\[5668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Nov  4 13:38:48 nextcloud sshd\[5668\]: Failed password for root from 222.186.173.183 port 56890 ssh2
Nov  4 13:38:52 nextcloud sshd\[5668\]: Failed password for root from 222.186.173.183 port 56890 ssh2
...
2019-11-04 20:42:49
37.17.138.10 attack
[ER hit] Tried to deliver spam. Already well known.
2019-11-04 21:08:03
46.166.151.47 attackspambots
\[2019-11-04 07:29:09\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T07:29:09.425-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="46812111447",SessionID="0x7fdf2c03bb98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/64768",ACLName="no_extension_match"
\[2019-11-04 07:31:57\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T07:31:57.176-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="90046462607509",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/53108",ACLName="no_extension_match"
\[2019-11-04 07:36:49\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T07:36:49.950-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="46462607509",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/55487",ACLName="no_extension_ma
2019-11-04 20:54:53
107.175.13.233 attackspambots
(From eric@talkwithcustomer.com) Hey,

You have a website naturalhealthdcs.com, right?

Of course you do. I am looking at your website now.

It gets traffic every day – that you’re probably spending $2 / $4 / $10 or more a click to get.  Not including all of the work you put into creating social media, videos, blog posts, emails, and so on.

So you’re investing seriously in getting people to that site.

But how’s it working?  Great? Okay?  Not so much?

If that answer could be better, then it’s likely you’re putting a lot of time, effort, and money into an approach that’s not paying off like it should.

Now… imagine doubling your lead conversion in just minutes… In fact, I’ll go even better.
 
You could actually get up to 100X more conversions!

I’m not making this up.  As Chris Smith, best-selling author of The Conversion Code says: Speed is essential - there is a 100x decrease in Leads when a Lead is contacted within 14 minutes vs being contacted within 5 minutes.

He’s backed up by a st
2019-11-04 21:09:24
149.56.24.8 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: srv.1libertygroup.com.
2019-11-04 20:34:55
193.112.14.81 attack
Nov  4 10:07:19 ncomp sshd[11700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.14.81  user=root
Nov  4 10:07:20 ncomp sshd[11700]: Failed password for root from 193.112.14.81 port 34886 ssh2
Nov  4 10:25:19 ncomp sshd[11931]: Invalid user test1 from 193.112.14.81
2019-11-04 21:11:08
178.128.75.154 attack
Nov  4 11:40:56 vpn01 sshd[15334]: Failed password for root from 178.128.75.154 port 46204 ssh2
...
2019-11-04 20:37:27
13.76.231.235 attackbotsspam
Nov  3 22:36:43 eola sshd[2259]: Invalid user pck from 13.76.231.235 port 55622
Nov  3 22:36:43 eola sshd[2259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.231.235 
Nov  3 22:36:45 eola sshd[2259]: Failed password for invalid user pck from 13.76.231.235 port 55622 ssh2
Nov  3 22:36:46 eola sshd[2259]: Received disconnect from 13.76.231.235 port 55622:11: Bye Bye [preauth]
Nov  3 22:36:46 eola sshd[2259]: Disconnected from 13.76.231.235 port 55622 [preauth]
Nov  3 22:44:42 eola sshd[2530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.231.235  user=r.r
Nov  3 22:44:44 eola sshd[2530]: Failed password for r.r from 13.76.231.235 port 60516 ssh2
Nov  3 22:44:44 eola sshd[2530]: Received disconnect from 13.76.231.235 port 60516:11: Bye Bye [preauth]
Nov  3 22:44:44 eola sshd[2530]: Disconnected from 13.76.231.235 port 60516 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/
2019-11-04 20:44:21
189.128.151.78 attack
Automatic report - Port Scan Attack
2019-11-04 20:39:15
103.252.250.107 attack
Nov  4 08:56:15 server sshd\[21177\]: Invalid user user1 from 103.252.250.107
Nov  4 08:56:15 server sshd\[21177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.252.250.107 
Nov  4 08:56:16 server sshd\[21177\]: Failed password for invalid user user1 from 103.252.250.107 port 47550 ssh2
Nov  4 09:22:02 server sshd\[27636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.252.250.107  user=root
Nov  4 09:22:03 server sshd\[27636\]: Failed password for root from 103.252.250.107 port 51436 ssh2
...
2019-11-04 20:46:42
107.191.108.131 attack
Nov  4 11:02:39 pl3server sshd[16451]: reveeclipse mapping checking getaddrinfo for mail.rocketadz.info [107.191.108.131] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov  4 11:02:39 pl3server sshd[16451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.191.108.131  user=r.r
Nov  4 11:02:41 pl3server sshd[16451]: Failed password for r.r from 107.191.108.131 port 33084 ssh2
Nov  4 11:02:41 pl3server sshd[16451]: Received disconnect from 107.191.108.131: 11: Bye Bye [preauth]
Nov  4 11:07:59 pl3server sshd[22858]: reveeclipse mapping checking getaddrinfo for mail.rocketadz.info [107.191.108.131] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov  4 11:07:59 pl3server sshd[22858]: Invalid user ts3 from 107.191.108.131
Nov  4 11:07:59 pl3server sshd[22858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.191.108.131


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=107.191.108.131
2019-11-04 20:33:13
181.164.38.214 attackbots
Automatic report - Banned IP Access
2019-11-04 20:31:38

Recently Reported IPs

155.230.100.133 162.158.107.20 145.19.67.63 37.214.252.99
71.71.154.29 41.145.225.232 184.147.204.241 197.43.21.53
134.56.143.254 77.164.142.241 123.207.58.160 34.239.66.35
128.218.52.126 174.50.138.215 142.32.57.189 178.113.107.216
70.228.57.143 64.221.78.21 181.226.27.105 129.150.141.176