Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.134.190.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.134.190.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:27:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 106.190.134.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.190.134.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.108.57.230 attackspam
Oct 23 13:49:11 mc1 kernel: \[3117698.102991\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=23.108.57.230 DST=159.69.205.51 LEN=52 TOS=0x02 PREC=0x00 TTL=118 ID=3508 DF PROTO=TCP SPT=51404 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0 
Oct 23 13:49:14 mc1 kernel: \[3117701.096207\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=23.108.57.230 DST=159.69.205.51 LEN=52 TOS=0x02 PREC=0x00 TTL=118 ID=3765 DF PROTO=TCP SPT=51404 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0 
Oct 23 13:49:20 mc1 kernel: \[3117707.095958\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=23.108.57.230 DST=159.69.205.51 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=4286 DF PROTO=TCP SPT=51404 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0 
...
2019-10-23 20:54:42
14.232.208.115 attackspam
SMB Server BruteForce Attack
2019-10-23 21:17:34
88.147.29.186 attackspam
Automatic report - Port Scan Attack
2019-10-23 21:11:45
157.7.52.245 attackbotsspam
Lines containing failures of 157.7.52.245
Oct 21 13:30:07 shared02 sshd[2600]: Invalid user admin from 157.7.52.245 port 60738
Oct 21 13:30:07 shared02 sshd[2600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.52.245
Oct 21 13:30:09 shared02 sshd[2600]: Failed password for invalid user admin from 157.7.52.245 port 60738 ssh2
Oct 21 13:30:09 shared02 sshd[2600]: Received disconnect from 157.7.52.245 port 60738:11: Normal Shutdown, Thank you for playing [preauth]
Oct 21 13:30:09 shared02 sshd[2600]: Disconnected from invalid user admin 157.7.52.245 port 60738 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.7.52.245
2019-10-23 21:15:04
49.234.51.242 attackspam
Automatic report - Banned IP Access
2019-10-23 20:50:01
113.31.102.157 attackbotsspam
Oct 23 13:44:24 vpn01 sshd[31512]: Failed password for root from 113.31.102.157 port 48564 ssh2
...
2019-10-23 20:50:35
14.116.222.170 attack
Oct 23 02:40:30 friendsofhawaii sshd\[4222\]: Invalid user 1wdc2efv from 14.116.222.170
Oct 23 02:40:30 friendsofhawaii sshd\[4222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170
Oct 23 02:40:32 friendsofhawaii sshd\[4222\]: Failed password for invalid user 1wdc2efv from 14.116.222.170 port 55901 ssh2
Oct 23 02:46:22 friendsofhawaii sshd\[4650\]: Invalid user knox123 from 14.116.222.170
Oct 23 02:46:22 friendsofhawaii sshd\[4650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170
2019-10-23 20:56:27
193.31.24.113 attackspam
10/23/2019-15:02:41.689000 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-23 21:07:20
45.143.220.16 attack
\[2019-10-23 08:29:56\] NOTICE\[2038\] chan_sip.c: Registration from '"1009" \' failed for '45.143.220.16:5194' - Wrong password
\[2019-10-23 08:29:56\] SECURITY\[2046\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-23T08:29:56.343-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1009",SessionID="0x7f6130804e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.16/5194",Challenge="267b198f",ReceivedChallenge="267b198f",ReceivedHash="d6dff9cc045972dc8c6cc836b8b7b860"
\[2019-10-23 08:29:56\] NOTICE\[2038\] chan_sip.c: Registration from '"1009" \' failed for '45.143.220.16:5194' - Wrong password
\[2019-10-23 08:29:56\] SECURITY\[2046\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-23T08:29:56.436-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1009",SessionID="0x7f6130286de8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD
2019-10-23 20:58:44
146.88.240.2 attackspambots
Message meets Alert condition
date=2019-10-23 time=03:04:57 devname=FG200E4Q16901016 devid=FG200E4Q16901016 logid=0101037124 type=event subtype=vpn level=error vd=root logdesc="IPsec phase 1 error" msg="IPsec phase 1 error" action=negotiate remip=146.88.240.2 locip=107.178.11.178 remport=60660 locport=500 outintf="wan1" cookies="a22b7032da7d4420/0000000000000000" user="N/A" group="N/A" xauthuser="N/A" xauthgroup="N/A" assignip=N/A vpntunnel="N/A" status=negotiate_error reason="peer SA proposal not match local policy" peer_notif="NOT-APPLICABLE"
2019-10-23 20:41:11
212.154.86.139 attackbots
Oct 23 12:29:06 localhost sshd\[83894\]: Invalid user dz from 212.154.86.139 port 47332
Oct 23 12:29:06 localhost sshd\[83894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.154.86.139
Oct 23 12:29:08 localhost sshd\[83894\]: Failed password for invalid user dz from 212.154.86.139 port 47332 ssh2
Oct 23 12:33:19 localhost sshd\[83993\]: Invalid user prieskorn from 212.154.86.139 port 57510
Oct 23 12:33:19 localhost sshd\[83993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.154.86.139
...
2019-10-23 20:56:59
58.254.132.156 attack
2019-10-23T12:53:32.166260abusebot-7.cloudsearch.cf sshd\[8298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156  user=root
2019-10-23 21:13:06
187.44.196.110 attackbotsspam
Unauthorised access (Oct 23) SRC=187.44.196.110 LEN=44 TTL=234 ID=46628 TCP DPT=445 WINDOW=1024 SYN
2019-10-23 21:05:39
167.71.145.149 attackbots
Automatic report - Banned IP Access
2019-10-23 21:00:14
189.172.84.32 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 20:58:09

Recently Reported IPs

241.175.68.62 44.159.121.192 141.201.83.109 21.138.57.246
77.194.127.225 235.11.238.221 190.87.44.28 138.108.243.135
246.126.79.123 143.83.244.249 244.209.208.126 46.73.139.16
104.190.160.104 174.187.22.222 148.37.34.248 251.190.207.22
12.25.51.245 67.127.81.150 237.69.20.205 106.63.199.49