Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 226.242.22.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;226.242.22.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011801 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 05:58:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 134.22.242.226.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.22.242.226.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.64.56.177 attack
Oct 19 14:55:26 DAAP sshd[20175]: Invalid user tudor from 212.64.56.177 port 52326
Oct 19 14:55:26 DAAP sshd[20175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.56.177
Oct 19 14:55:26 DAAP sshd[20175]: Invalid user tudor from 212.64.56.177 port 52326
Oct 19 14:55:28 DAAP sshd[20175]: Failed password for invalid user tudor from 212.64.56.177 port 52326 ssh2
...
2019-10-20 01:29:33
138.197.129.38 attackspam
3x Failed Password
2019-10-20 01:36:56
86.146.174.183 attackspam
Invalid user pi from 86.146.174.183 port 51452
2019-10-20 01:42:25
178.128.167.195 attackbots
Invalid user hadoop from 178.128.167.195 port 52640
2019-10-20 01:55:32
49.255.179.216 attackspambots
Invalid user service from 49.255.179.216 port 58056
2019-10-20 01:47:44
104.200.110.191 attackbotsspam
Invalid user vinay from 104.200.110.191 port 43930
2019-10-20 01:41:18
217.66.201.114 attackspambots
Oct 19 18:06:59 mail sshd[1467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.66.201.114
Oct 19 18:07:01 mail sshd[1467]: Failed password for invalid user postgres from 217.66.201.114 port 47916 ssh2
...
2019-10-20 01:28:40
192.169.156.194 attackspam
Invalid user fujimoto from 192.169.156.194 port 34970
2019-10-20 01:30:18
180.68.177.209 attackspam
Oct 19 17:22:39 v22018076622670303 sshd\[25388\]: Invalid user ainsworth from 180.68.177.209 port 37886
Oct 19 17:22:39 v22018076622670303 sshd\[25388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.209
Oct 19 17:22:41 v22018076622670303 sshd\[25388\]: Failed password for invalid user ainsworth from 180.68.177.209 port 37886 ssh2
...
2019-10-20 01:31:57
42.159.89.4 attackspambots
Invalid user vcloud from 42.159.89.4 port 43816
2019-10-20 01:48:53
173.82.156.54 attackspam
Invalid user uucp from 173.82.156.54 port 42418
2019-10-20 01:33:08
159.203.74.227 attackspam
Invalid user art from 159.203.74.227 port 53074
2019-10-20 01:58:58
62.7.90.34 attackbotsspam
Invalid user oj from 62.7.90.34 port 55160
2019-10-20 01:45:21
178.30.164.120 attack
Invalid user pi from 178.30.164.120 port 32844
2019-10-20 01:56:54
202.73.9.76 attackspam
Oct 19 23:36:48 lcl-usvr-02 sshd[4060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.73.9.76  user=root
Oct 19 23:36:50 lcl-usvr-02 sshd[4060]: Failed password for root from 202.73.9.76 port 51549 ssh2
Oct 19 23:41:11 lcl-usvr-02 sshd[5211]: Invalid user gp from 202.73.9.76 port 34167
Oct 19 23:41:11 lcl-usvr-02 sshd[5211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.73.9.76
Oct 19 23:41:11 lcl-usvr-02 sshd[5211]: Invalid user gp from 202.73.9.76 port 34167
Oct 19 23:41:13 lcl-usvr-02 sshd[5211]: Failed password for invalid user gp from 202.73.9.76 port 34167 ssh2
...
2019-10-20 01:23:27

Recently Reported IPs

151.72.76.236 211.220.92.9 35.175.72.99 197.26.136.40
246.8.31.96 167.29.243.5 80.193.57.214 103.197.68.241
219.88.109.92 74.216.163.35 78.145.197.88 136.33.149.120
43.159.199.15 222.54.124.37 224.108.56.12 213.215.56.134
43.140.3.183 54.87.139.140 79.112.120.82 201.140.175.124