Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 234.60.204.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40298
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;234.60.204.134.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 14:32:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 134.204.60.234.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.204.60.234.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
110.164.189.53 attackbots
Sep  7 11:05:43 pkdns2 sshd\[7278\]: Failed password for root from 110.164.189.53 port 60740 ssh2Sep  7 11:08:47 pkdns2 sshd\[7412\]: Invalid user ftpuser from 110.164.189.53Sep  7 11:08:49 pkdns2 sshd\[7412\]: Failed password for invalid user ftpuser from 110.164.189.53 port 40012 ssh2Sep  7 11:10:21 pkdns2 sshd\[7553\]: Failed password for root from 110.164.189.53 port 60354 ssh2Sep  7 11:11:51 pkdns2 sshd\[7611\]: Failed password for root from 110.164.189.53 port 52464 ssh2Sep  7 11:13:21 pkdns2 sshd\[7695\]: Failed password for root from 110.164.189.53 port 44578 ssh2
...
2020-09-07 16:26:04
101.78.209.39 attack
Sep  7 08:44:15 root sshd[11609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39 
...
2020-09-07 16:03:39
121.17.162.236 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-07 16:38:05
106.13.177.53 attackbots
Brute-force attempt banned
2020-09-07 16:19:21
91.229.112.12 attackbots
Persistent port scanning [21 denied]
2020-09-07 16:25:12
64.132.150.35 attackbots
Honeypot attack, port: 445, PTR: barracuda.gipath.com.
2020-09-07 16:11:56
191.250.225.15 attackbots
Icarus honeypot on github
2020-09-07 16:40:49
49.235.153.220 attackspam
Sep  7 08:41:48 rancher-0 sshd[1476910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.153.220  user=root
Sep  7 08:41:51 rancher-0 sshd[1476910]: Failed password for root from 49.235.153.220 port 42866 ssh2
...
2020-09-07 16:15:28
180.250.108.130 attack
" "
2020-09-07 16:22:43
184.105.139.75 attackspambots
Port scan denied
2020-09-07 16:11:30
167.248.133.20 attackbotsspam
proto=tcp  .  spt=58211  .  dpt=995  .  src=167.248.133.20  .  dst=xx.xx.4.1  .     Found on   CINS badguys       (83)
2020-09-07 16:18:27
80.32.131.229 attackspambots
$f2bV_matches
2020-09-07 16:27:36
117.107.213.244 attack
$f2bV_matches
2020-09-07 16:20:58
173.212.242.65 attackbotsspam
Port probing on unauthorized port 111
2020-09-07 16:15:12
45.14.150.140 attack
SSH login attempts.
2020-09-07 16:05:32

Recently Reported IPs

117.134.200.66 200.245.72.104 201.97.107.147 144.132.105.244
4.195.54.146 20.43.233.224 181.125.222.220 166.121.175.231
233.26.228.170 29.59.56.107 108.225.204.61 141.159.244.200
247.185.114.165 25.105.115.159 224.106.96.186 117.28.118.240
52.94.76.160 31.61.97.208 176.252.116.232 193.32.52.157