Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Baku

Region: Baku City

Country: Azerbaijan

Internet Service Provider: unknown

Hostname: unknown

Organization: Superonlayn Ltd

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.134.62.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.134.62.172.			IN	A

;; AUTHORITY SECTION:
.			2726	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032802 1800 900 604800 86400

;; Query time: 179 msec
;; SERVER: 183.60.82.98#53(183.60.82.98)
;; WHEN: Fri Mar 29 05:16:17 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 172.62.134.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.62.134.5.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
42.234.251.236 attack
Port probing on unauthorized port 1023
2020-09-25 01:20:02
1.65.206.249 attackspam
Sep 23 14:01:39 logopedia-1vcpu-1gb-nyc1-01 sshd[126887]: Failed password for root from 1.65.206.249 port 51154 ssh2
...
2020-09-25 01:21:33
104.238.184.114 attackbotsspam
Attempt to hack Wordpress Login, XMLRPC or other login
2020-09-25 01:21:01
180.67.72.138 attackbotsspam
Automatic report - Banned IP Access
2020-09-25 01:27:47
122.51.225.107 attackspambots
Tried sshing with brute force.
2020-09-25 01:20:46
161.35.148.75 attackbotsspam
Invalid user user from 161.35.148.75 port 47978
2020-09-25 01:43:09
1.20.151.42 attack
1600880493 - 09/23/2020 19:01:33 Host: 1.20.151.42/1.20.151.42 Port: 445 TCP Blocked
2020-09-25 01:26:49
52.148.95.225 attackspam
Sep 24 18:36:20 vps639187 sshd\[17554\]: Invalid user admin from 52.148.95.225 port 47143
Sep 24 18:36:20 vps639187 sshd\[17554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.148.95.225
Sep 24 18:36:22 vps639187 sshd\[17554\]: Failed password for invalid user admin from 52.148.95.225 port 47143 ssh2
...
2020-09-25 01:38:23
128.199.30.242 attackspambots
Invalid user recepcion from 128.199.30.242 port 47510
2020-09-25 01:22:43
78.94.180.85 attackbotsspam
Icarus honeypot on github
2020-09-25 01:38:03
82.42.183.52 attack
Sep 23 21:01:29 php sshd[2843]: Invalid user netman from 82.42.183.52 port 39760
Sep 23 21:01:29 php sshd[2843]: Connection closed by 82.42.183.52 port 39760 [preauth]
Sep 23 21:01:31 php sshd[2875]: Invalid user osmc from 82.42.183.52 port 39951
Sep 23 21:01:31 php sshd[2875]: Connection closed by 82.42.183.52 port 39951 [preauth]
Sep 23 21:01:32 php sshd[2881]: Invalid user pi from 82.42.183.52 port 40005
Sep 23 21:01:32 php sshd[2881]: Connection closed by 82.42.183.52 port 40005 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.42.183.52
2020-09-25 01:15:59
45.114.130.182 attack
Brute forcing RDP port 3389
2020-09-25 01:11:58
85.132.10.183 attack
Unauthorized connection attempt from IP address 85.132.10.183 on Port 445(SMB)
2020-09-25 01:42:05
219.78.249.93 attackbotsspam
Brute-force attempt banned
2020-09-25 01:17:51
160.153.156.141 attackspam
Automatic report - Banned IP Access
2020-09-25 01:10:57

Recently Reported IPs

27.54.171.236 113.176.31.59 82.119.111.122 180.169.225.60
114.67.229.70 113.161.6.86 92.74.62.204 14.161.15.98
206.189.165.31 196.41.88.34 37.195.50.41 115.29.9.88
92.154.98.28 203.74.127.79 121.201.34.97 118.70.146.231
138.201.119.45 43.227.223.8 85.15.46.4 178.76.71.141