Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
5.134.48.72 attackspam
Unauthorized connection attempt from IP address 5.134.48.72 on Port 445(SMB)
2020-09-01 01:58:07
5.134.48.17 attackbotsspam
2020-08-04T08:57:22.333802vps751288.ovh.net sshd\[14900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.134.48.17  user=root
2020-08-04T08:57:24.625771vps751288.ovh.net sshd\[14900\]: Failed password for root from 5.134.48.17 port 52766 ssh2
2020-08-04T09:01:58.080797vps751288.ovh.net sshd\[14945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.134.48.17  user=root
2020-08-04T09:02:00.263070vps751288.ovh.net sshd\[14945\]: Failed password for root from 5.134.48.17 port 35586 ssh2
2020-08-04T09:06:27.479171vps751288.ovh.net sshd\[14978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.134.48.17  user=root
2020-08-04 15:21:26
5.134.48.17 attack
2020-07-20T12:26:17.266011vps2034 sshd[307]: Invalid user git from 5.134.48.17 port 54366
2020-07-20T12:26:17.269950vps2034 sshd[307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.134.48.17
2020-07-20T12:26:17.266011vps2034 sshd[307]: Invalid user git from 5.134.48.17 port 54366
2020-07-20T12:26:19.139596vps2034 sshd[307]: Failed password for invalid user git from 5.134.48.17 port 54366 ssh2
2020-07-20T12:30:19.252255vps2034 sshd[10513]: Invalid user felix from 5.134.48.17 port 57762
...
2020-07-21 02:59:37
5.134.48.17 attackbotsspam
$f2bV_matches
2020-07-10 16:57:41
5.134.48.131 attackspambots
Port Scan: TCP/4486
2019-09-03 00:07:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.134.48.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.134.48.220.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 150 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 11:33:04 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 220.48.134.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.48.134.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.203.87.232 attack
Port Scan: TCP/443
2019-09-14 11:54:31
24.59.26.83 attackspambots
Port Scan: UDP/137
2019-09-14 11:55:32
78.190.193.239 attackspam
Port Scan: TCP/25
2019-09-14 11:18:32
88.196.162.16 attackspambots
Port Scan: TCP/445
2019-09-14 11:44:13
103.133.92.135 attackbots
Port Scan: TCP/445
2019-09-14 11:41:34
58.64.157.131 attackspam
Port Scan: TCP/445
2019-09-14 11:24:14
179.156.31.82 attack
Port Scan: TCP/5358
2019-09-14 11:35:00
150.109.58.138 attackbots
Chat Spam
2019-09-14 11:38:02
66.41.152.130 attackbotsspam
Port Scan: TCP/23
2019-09-14 11:22:36
50.207.219.250 attack
Port Scan: UDP/137
2019-09-14 11:25:16
185.216.34.172 attack
Port Scan: TCP/443
2019-09-14 12:03:34
72.139.33.118 attackbotsspam
Port Scan: UDP/137
2019-09-14 11:48:22
76.79.125.86 attackbots
Port Scan: UDP/137
2019-09-14 11:19:26
177.69.66.13 attackbotsspam
Port Scan: UDP/137
2019-09-14 11:36:17
50.205.206.182 attack
Port Scan: UDP/560
2019-09-14 11:52:32

Recently Reported IPs

5.124.27.17 5.134.194.186 5.139.90.115 5.139.47.171
5.142.139.255 5.136.72.144 5.157.102.251 5.163.120.101
5.164.204.184 5.164.55.101 5.166.168.169 5.167.56.94
5.164.8.123 5.165.20.194 5.164.31.91 5.173.158.60
5.181.170.17 5.202.136.153 5.202.144.184 5.202.157.173