Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.134.190.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.134.190.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025033000 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 31 00:44:15 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 82.190.134.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.134.190.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.212.143.133 attackspambots
445/tcp
[2019-07-11]1pkt
2019-07-11 20:13:03
124.94.144.211 attackspam
23/tcp
[2019-07-11]1pkt
2019-07-11 20:13:24
104.248.144.130 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 20:34:07
36.66.172.107 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-11 05:41:38]
2019-07-11 20:26:19
119.1.84.130 attackbots
vps1:sshd-InvalidUser
2019-07-11 19:51:35
78.36.2.4 attack
'IP reached maximum auth failures for a one day block'
2019-07-11 19:43:54
187.86.131.109 attackbots
firewall-block, port(s): 3389/tcp
2019-07-11 20:13:55
116.224.50.47 attack
23/tcp
[2019-07-11]1pkt
2019-07-11 20:11:56
88.249.64.9 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 20:04:05
217.238.166.113 attackspam
2019-07-11T11:48:12.516184abusebot-4.cloudsearch.cf sshd\[28917\]: Invalid user isabelle from 217.238.166.113 port 46696
2019-07-11 19:51:16
113.76.137.84 attackbots
Jul 11 05:24:18 mxgate1 postfix/postscreen[9482]: CONNECT from [113.76.137.84]:57350 to [176.31.12.44]:25
Jul 11 05:24:18 mxgate1 postfix/dnsblog[9856]: addr 113.76.137.84 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 11 05:24:18 mxgate1 postfix/dnsblog[9856]: addr 113.76.137.84 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 11 05:24:18 mxgate1 postfix/dnsblog[9857]: addr 113.76.137.84 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 11 05:24:18 mxgate1 postfix/dnsblog[9854]: addr 113.76.137.84 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 11 05:24:24 mxgate1 postfix/postscreen[9482]: DNSBL rank 4 for [113.76.137.84]:57350
Jul x@x
Jul 11 05:24:25 mxgate1 postfix/postscreen[9482]: HANGUP after 0.99 from [113.76.137.84]:57350 in tests after SMTP handshake
Jul 11 05:24:25 mxgate1 postfix/postscreen[9482]: DISCONNECT [113.76.137.84]:57350
Jul 11 05:24:25 mxgate1 postfix/postscreen[9482]: CONNECT from [113.76.137.84]:57452 to [176.31.12.44]:25
Jul 11 05........
-------------------------------
2019-07-11 20:34:35
197.39.162.183 attack
23/tcp
[2019-07-11]1pkt
2019-07-11 20:22:27
83.23.18.35 attackspambots
port scan and connect, tcp 23 (telnet)
2019-07-11 19:48:12
182.61.137.108 attackspambots
2019-07-11T09:09:59.329485abusebot-4.cloudsearch.cf sshd\[28724\]: Invalid user postgres from 182.61.137.108 port 51468
2019-07-11 19:54:58
110.136.172.147 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 19:49:35

Recently Reported IPs

240.191.131.233 37.174.182.0 182.151.217.33 60.112.145.235
133.66.223.184 249.26.136.51 148.40.60.45 226.20.79.75
55.81.113.204 42.236.17.69 144.51.74.59 104.14.23.165
152.84.226.106 13.152.184.178 128.143.22.119 46.105.221.64
20.104.167.166 137.121.25.123 226.30.182.133 200.241.25.35