Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
5.134.192.232 attackbots
SSH login attempts.
2020-08-22 21:11:36
5.134.196.122 attackbots
Unauthorized connection attempt from IP address 5.134.196.122 on Port 445(SMB)
2020-05-07 22:57:58
5.134.195.143 attackspam
unauthorized connection attempt
2020-02-26 13:41:39
5.134.198.114 attackspambots
unauthorized connection attempt
2020-02-07 21:42:29
5.134.194.110 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-07 20:13:19
5.134.193.211 attackbots
1578260806 - 01/05/2020 22:46:46 Host: 5.134.193.211/5.134.193.211 Port: 445 TCP Blocked
2020-01-06 09:33:07
5.134.198.114 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-14 21:59:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.134.19.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51455
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.134.19.0.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 26 01:40:33 CST 2019
;; MSG SIZE  rcvd: 114
Host info
Host 0.19.134.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 0.19.134.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
179.191.224.126 attackbots
Feb 28 00:26:53 jane sshd[22944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.224.126 
Feb 28 00:26:55 jane sshd[22944]: Failed password for invalid user tomcat from 179.191.224.126 port 38854 ssh2
...
2020-02-28 08:46:49
222.186.175.151 attack
Feb 28 02:01:12 domagoj sshd\[15439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Feb 28 02:01:14 domagoj sshd\[15439\]: Failed password for root from 222.186.175.151 port 27752 ssh2
Feb 28 02:01:31 domagoj sshd\[15441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Feb 28 02:01:33 domagoj sshd\[15441\]: Failed password for root from 222.186.175.151 port 50616 ssh2
2020-02-28 09:12:44
223.15.205.56 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 09:12:17
14.185.13.30 attackspam
Unauthorized connection attempt from IP address 14.185.13.30 on Port 445(SMB)
2020-02-28 08:54:18
149.202.206.206 attack
Invalid user steve from 149.202.206.206 port 53853
2020-02-28 08:53:05
177.194.166.182 attackbots
Unauthorized connection attempt from IP address 177.194.166.182 on Port 445(SMB)
2020-02-28 09:07:53
222.186.169.194 attack
Feb 28 01:49:25 eventyay sshd[3671]: Failed password for root from 222.186.169.194 port 34966 ssh2
Feb 28 01:49:28 eventyay sshd[3671]: Failed password for root from 222.186.169.194 port 34966 ssh2
Feb 28 01:49:32 eventyay sshd[3671]: Failed password for root from 222.186.169.194 port 34966 ssh2
Feb 28 01:49:35 eventyay sshd[3671]: Failed password for root from 222.186.169.194 port 34966 ssh2
Feb 28 01:49:38 eventyay sshd[3671]: Failed password for root from 222.186.169.194 port 34966 ssh2
Feb 28 01:49:38 eventyay sshd[3671]: error: maximum authentication attempts exceeded for root from 222.186.169.194 port 34966 ssh2 [preauth]
...
2020-02-28 08:56:59
140.143.199.169 attackspam
Invalid user tanwei from 140.143.199.169 port 47012
2020-02-28 09:23:48
202.39.28.8 attack
Invalid user export from 202.39.28.8 port 58528
2020-02-28 08:52:31
222.186.175.150 attack
Feb 28 01:58:24 server sshd[2220409]: Failed none for root from 222.186.175.150 port 54152 ssh2
Feb 28 01:58:26 server sshd[2220409]: Failed password for root from 222.186.175.150 port 54152 ssh2
Feb 28 01:58:30 server sshd[2220409]: Failed password for root from 222.186.175.150 port 54152 ssh2
2020-02-28 09:01:36
153.126.142.248 attackspam
Invalid user testuser from 153.126.142.248 port 42704
2020-02-28 09:23:06
159.203.27.98 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-28 09:22:33
178.32.221.142 attackbotsspam
Invalid user tanwei from 178.32.221.142 port 33887
2020-02-28 09:20:46
201.248.70.174 attackspam
Unauthorized connection attempt from IP address 201.248.70.174 on Port 445(SMB)
2020-02-28 09:03:39
104.248.121.67 attack
Feb 28 01:39:11 vpn01 sshd[1048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67
Feb 28 01:39:12 vpn01 sshd[1048]: Failed password for invalid user smtp from 104.248.121.67 port 39928 ssh2
...
2020-02-28 09:08:11

Recently Reported IPs

156.162.241.237 105.190.246.141 155.102.191.119 230.100.50.215
13.104.207.170 63.165.219.24 184.207.215.150 191.239.245.97
82.147.98.229 11.238.101.231 201.64.63.76 141.21.167.137
102.62.68.153 213.159.154.29 5.243.252.216 163.172.106.112
60.37.79.145 93.155.85.51 114.238.127.158 45.13.39.56