Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.134.109.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.134.109.8.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 01:16:15 CST 2020
;; MSG SIZE  rcvd: 115
Host info
8.109.134.3.in-addr.arpa domain name pointer ec2-3-134-109-8.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.109.134.3.in-addr.arpa	name = ec2-3-134-109-8.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.238.116.19 attack
Feb 24 19:07:42 stark sshd[23211]: Invalid user typhon from 104.238.116.19
Feb 24 19:10:55 stark sshd[23473]: Invalid user typhon from 104.238.116.19
Feb 24 19:14:09 stark sshd[23494]: Invalid user typhon from 104.238.116.19
Feb 24 19:17:19 stark sshd[23561]: Invalid user user from 104.238.116.19
2020-02-25 09:53:35
36.233.107.83 attackspambots
Honeypot attack, port: 81, PTR: 36-233-107-83.dynamic-ip.hinet.net.
2020-02-25 10:32:32
81.213.166.62 attackbotsspam
DATE:2020-02-25 00:20:39, IP:81.213.166.62, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-25 10:33:00
92.171.176.123 attack
Honeypot attack, port: 5555, PTR: lfbn-cle-1-727-123.w92-171.abo.wanadoo.fr.
2020-02-25 09:58:03
104.168.174.226 attack
Feb 24 23:22:54 *** sshd[28406]: Invalid user db2fenc1 from 104.168.174.226
2020-02-25 10:22:14
202.200.142.251 attackspambots
Feb 25 01:58:20 server sshd\[7734\]: Invalid user maggie from 202.200.142.251
Feb 25 01:58:20 server sshd\[7734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.200.142.251 
Feb 25 01:58:22 server sshd\[7734\]: Failed password for invalid user maggie from 202.200.142.251 port 59178 ssh2
Feb 25 02:23:06 server sshd\[13140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.200.142.251  user=root
Feb 25 02:23:07 server sshd\[13140\]: Failed password for root from 202.200.142.251 port 58906 ssh2
...
2020-02-25 10:07:00
73.99.136.207 attackspam
Feb 25 03:34:03 ift sshd\[13629\]: Invalid user default from 73.99.136.207Feb 25 03:34:06 ift sshd\[13629\]: Failed password for invalid user default from 73.99.136.207 port 37678 ssh2Feb 25 03:37:51 ift sshd\[14128\]: Invalid user himanshu from 73.99.136.207Feb 25 03:37:53 ift sshd\[14128\]: Failed password for invalid user himanshu from 73.99.136.207 port 47684 ssh2Feb 25 03:41:30 ift sshd\[14771\]: Invalid user dev from 73.99.136.207
...
2020-02-25 10:15:19
141.98.10.137 attack
Feb 25 02:46:45 srv01 postfix/smtpd\[6008\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 25 02:49:30 srv01 postfix/smtpd\[2572\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 25 02:50:05 srv01 postfix/smtpd\[2572\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 25 02:58:22 srv01 postfix/smtpd\[7623\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 25 03:02:50 srv01 postfix/smtpd\[16089\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-25 10:14:59
62.46.161.21 attackbots
Feb 25 00:59:43 host sshd[35071]: Invalid user moodle from 62.46.161.21 port 57504
...
2020-02-25 10:31:48
49.206.198.33 attackbots
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-02-25 09:54:41
90.94.83.26 attackspambots
suspicious action Mon, 24 Feb 2020 20:23:06 -0300
2020-02-25 10:10:47
119.207.126.21 attackbotsspam
Feb 25 02:52:50 MK-Soft-VM3 sshd[19419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.126.21 
Feb 25 02:52:52 MK-Soft-VM3 sshd[19419]: Failed password for invalid user weblogic from 119.207.126.21 port 57530 ssh2
...
2020-02-25 09:58:53
94.191.40.166 attack
2020-02-24T23:34:29.511436shield sshd\[9502\]: Invalid user ftp-user from 94.191.40.166 port 39344
2020-02-24T23:34:29.520219shield sshd\[9502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.40.166
2020-02-24T23:34:31.152012shield sshd\[9502\]: Failed password for invalid user ftp-user from 94.191.40.166 port 39344 ssh2
2020-02-24T23:36:07.240025shield sshd\[9915\]: Invalid user carlo from 94.191.40.166 port 58408
2020-02-24T23:36:07.244167shield sshd\[9915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.40.166
2020-02-25 10:03:07
106.1.147.148 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-25 10:04:04
162.219.253.20 attackbotsspam
Feb 25 00:14:20 pl1server sshd[13929]: Invalid user admin from 162.219.253.20
Feb 25 00:14:20 pl1server sshd[13929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.219.253.20
Feb 25 00:14:22 pl1server sshd[13929]: Failed password for invalid user admin from 162.219.253.20 port 54453 ssh2
Feb 25 00:14:22 pl1server sshd[13929]: Connection closed by 162.219.253.20 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=162.219.253.20
2020-02-25 09:51:21

Recently Reported IPs

144.54.145.109 165.232.113.180 84.33.119.193 103.153.183.250
38.38.5.30 166.205.111.119 38.227.128.108 115.127.83.81
51.83.129.84 28.79.129.241 193.109.4.21 95.243.37.74
125.224.211.238 159.224.17.21 123.163.27.224 123.149.137.150
45.77.168.60 181.215.46.78 217.20.119.47 170.254.189.23