Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.69.210.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.69.210.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 21:15:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 134.210.69.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.210.69.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.41.9.161 attackspambots
Fail2Ban Ban Triggered
2019-11-12 13:46:23
42.235.21.3 attack
Fail2Ban Ban Triggered
2019-11-12 13:52:37
182.122.180.94 attackspambots
Fail2Ban Ban Triggered
2019-11-12 13:38:20
45.165.19.191 attack
Automatic report - Port Scan Attack
2019-11-12 14:17:40
118.32.181.96 attack
Nov 12 06:18:35 srv1 sshd[32661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.181.96
Nov 12 06:18:37 srv1 sshd[32661]: Failed password for invalid user webmaster from 118.32.181.96 port 36938 ssh2
...
2019-11-12 13:50:57
42.235.18.35 attackspam
Fail2Ban Ban Triggered
2019-11-12 14:13:40
222.186.173.142 attack
Nov 12 06:48:09 tuxlinux sshd[23714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
...
2019-11-12 13:53:55
139.162.122.110 attackbots
Nov 12 06:49:43 server sshd\[29896\]: Invalid user  from 139.162.122.110
Nov 12 06:49:43 server sshd\[29896\]: Failed none for invalid user  from 139.162.122.110 port 47138 ssh2
Nov 12 08:15:03 server sshd\[20413\]: Invalid user  from 139.162.122.110
Nov 12 08:15:03 server sshd\[20413\]: Failed none for invalid user  from 139.162.122.110 port 40614 ssh2
Nov 12 08:53:42 server sshd\[30526\]: Invalid user  from 139.162.122.110
...
2019-11-12 14:02:09
177.107.68.47 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/177.107.68.47/ 
 
 BR - 1H : (121)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN52862 
 
 IP : 177.107.68.47 
 
 CIDR : 177.107.68.0/24 
 
 PREFIX COUNT : 37 
 
 UNIQUE IP COUNT : 10240 
 
 
 ATTACKS DETECTED ASN52862 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-11-12 05:57:18 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-12 14:12:49
1.55.241.4 attackspam
postfix (unknown user, SPF fail or relay access denied)
2019-11-12 14:04:02
125.44.149.76 attack
Fail2Ban Ban Triggered
2019-11-12 13:51:36
182.116.110.144 attack
Fail2Ban Ban Triggered
2019-11-12 14:00:20
157.245.1.113 attackbots
Nov 12 07:37:05 www sshd\[24199\]: Invalid user xtreme from 157.245.1.113Nov 12 07:37:07 www sshd\[24199\]: Failed password for invalid user xtreme from 157.245.1.113 port 41946 ssh2Nov 12 07:40:50 www sshd\[24331\]: Invalid user swinkin from 157.245.1.113
...
2019-11-12 13:53:13
182.126.75.145 attackbots
Fail2Ban Ban Triggered
2019-11-12 14:11:42
182.122.184.209 attackbotsspam
Fail2Ban Ban Triggered
2019-11-12 13:41:44

Recently Reported IPs

210.1.104.230 15.119.170.166 28.166.229.180 5.118.129.151
223.181.75.253 38.198.211.49 39.200.239.215 207.233.247.36
4.109.183.52 2.60.38.138 251.157.65.4 107.30.3.248
143.194.145.22 252.162.204.3 213.64.75.15 90.173.94.126
12.205.196.186 161.8.116.190 224.43.175.167 192.38.209.93