Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Belgium

Internet Service Provider: unknown

Hostname: unknown

Organization: Societe Internationale de Telecommunications Aeronautiques

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.134.41.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25920
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;57.134.41.114.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081800 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 19 00:31:20 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 114.41.134.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 114.41.134.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.150.172.198 attackbotsspam
2019-10-11T21:33:01.003575static.108.197.76.144.clients.your-server.de sshd[10681]: Invalid user pi from 109.150.172.198
2019-10-11T21:33:01.042121static.108.197.76.144.clients.your-server.de sshd[10681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.150.172.198
2019-10-11T21:33:01.072508static.108.197.76.144.clients.your-server.de sshd[10683]: Invalid user pi from 109.150.172.198
2019-10-11T21:33:01.132282static.108.197.76.144.clients.your-server.de sshd[10683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.150.172.198
2019-10-11T21:33:03.458330static.108.197.76.144.clients.your-server.de sshd[10681]: Failed password for invalid user pi from 109.150.172.198 port 53154 ssh2
2019-10-11T21:33:03.548291static.108.197.76.144.clients.your-server.de sshd[10683]: Failed password for invalid user pi from 109.150.172.198 port 53156 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.h
2019-10-12 11:33:53
95.213.177.124 attackspam
Port scan on 1 port(s): 3128
2019-10-12 11:50:34
49.88.112.71 attackbotsspam
2019-10-11T15:50:58.314560shield sshd\[5070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-10-11T15:51:00.049606shield sshd\[5070\]: Failed password for root from 49.88.112.71 port 56560 ssh2
2019-10-11T15:51:02.663815shield sshd\[5070\]: Failed password for root from 49.88.112.71 port 56560 ssh2
2019-10-11T15:51:04.545794shield sshd\[5070\]: Failed password for root from 49.88.112.71 port 56560 ssh2
2019-10-11T15:51:44.020414shield sshd\[5074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-10-12 11:35:11
59.127.155.17 attackspambots
23/tcp 23/tcp 23/tcp
[2019-09-20/10-11]3pkt
2019-10-12 11:25:24
95.156.255.222 attackspambots
Oct 11 07:28:48 xb0 sshd[5154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.156.255.222  user=r.r
Oct 11 07:28:50 xb0 sshd[5154]: Failed password for r.r from 95.156.255.222 port 52230 ssh2
Oct 11 07:28:50 xb0 sshd[5154]: Received disconnect from 95.156.255.222: 11: Bye Bye [preauth]
Oct 11 07:42:24 xb0 sshd[2494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.156.255.222  user=r.r
Oct 11 07:42:26 xb0 sshd[2494]: Failed password for r.r from 95.156.255.222 port 52902 ssh2
Oct 11 07:42:26 xb0 sshd[2494]: Received disconnect from 95.156.255.222: 11: Bye Bye [preauth]
Oct 11 07:45:42 xb0 sshd[28905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.156.255.222  user=r.r
Oct 11 07:45:45 xb0 sshd[28905]: Failed password for r.r from 95.156.255.222 port 40632 ssh2
Oct 11 07:45:45 xb0 sshd[28905]: Received disconnect from 95.156.255.222: 11: Bye........
-------------------------------
2019-10-12 11:53:50
60.210.113.13 attackspam
SSH invalid-user multiple login attempts
2019-10-12 12:01:32
210.210.175.63 attackbotsspam
Oct 12 03:35:39 venus sshd\[8899\]: Invalid user Army@123 from 210.210.175.63 port 60292
Oct 12 03:35:39 venus sshd\[8899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.210.175.63
Oct 12 03:35:41 venus sshd\[8899\]: Failed password for invalid user Army@123 from 210.210.175.63 port 60292 ssh2
...
2019-10-12 11:39:28
106.13.38.59 attack
Oct 12 05:13:01 meumeu sshd[22043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.38.59 
Oct 12 05:13:03 meumeu sshd[22043]: Failed password for invalid user P4sswort_1@3 from 106.13.38.59 port 30515 ssh2
Oct 12 05:17:15 meumeu sshd[22621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.38.59 
...
2019-10-12 11:29:25
51.75.251.153 attack
Oct 11 05:43:44 php1 sshd\[30831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.ip-51-75-251.eu  user=root
Oct 11 05:43:47 php1 sshd\[30831\]: Failed password for root from 51.75.251.153 port 38422 ssh2
Oct 11 05:47:42 php1 sshd\[31279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.ip-51-75-251.eu  user=root
Oct 11 05:47:45 php1 sshd\[31279\]: Failed password for root from 51.75.251.153 port 49442 ssh2
Oct 11 05:51:42 php1 sshd\[31727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.ip-51-75-251.eu  user=root
2019-10-12 11:35:52
222.186.42.4 attack
2019-10-12T03:50:38.454148hub.schaetter.us sshd\[27453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2019-10-12T03:50:39.713126hub.schaetter.us sshd\[27453\]: Failed password for root from 222.186.42.4 port 14158 ssh2
2019-10-12T03:50:44.205204hub.schaetter.us sshd\[27453\]: Failed password for root from 222.186.42.4 port 14158 ssh2
2019-10-12T03:50:48.452468hub.schaetter.us sshd\[27453\]: Failed password for root from 222.186.42.4 port 14158 ssh2
2019-10-12T03:50:52.248171hub.schaetter.us sshd\[27453\]: Failed password for root from 222.186.42.4 port 14158 ssh2
...
2019-10-12 11:57:02
95.213.177.125 attackbots
" "
2019-10-12 11:49:56
112.85.42.89 attack
Oct 12 05:13:28 ns381471 sshd[30660]: Failed password for root from 112.85.42.89 port 44246 ssh2
Oct 12 05:16:17 ns381471 sshd[30740]: Failed password for root from 112.85.42.89 port 24310 ssh2
2019-10-12 11:20:01
103.91.54.100 attack
SSHScan
2019-10-12 11:21:26
83.174.223.160 attackspambots
Oct 11 15:42:04 ip-172-31-62-245 sshd\[20683\]: Invalid user 123Discount from 83.174.223.160\
Oct 11 15:42:05 ip-172-31-62-245 sshd\[20683\]: Failed password for invalid user 123Discount from 83.174.223.160 port 30203 ssh2\
Oct 11 15:46:23 ip-172-31-62-245 sshd\[20716\]: Invalid user Rodrigo@123 from 83.174.223.160\
Oct 11 15:46:25 ip-172-31-62-245 sshd\[20716\]: Failed password for invalid user Rodrigo@123 from 83.174.223.160 port 47649 ssh2\
Oct 11 15:50:39 ip-172-31-62-245 sshd\[20734\]: Invalid user Compiler_123 from 83.174.223.160\
2019-10-12 11:52:36
139.59.37.209 attackspam
SSH Bruteforce
2019-10-12 11:52:56

Recently Reported IPs

111.122.220.73 52.36.230.2 99.34.173.127 119.20.85.228
223.215.90.133 36.98.143.175 204.174.253.178 180.131.119.199
49.218.47.218 96.48.6.121 86.250.24.73 17.195.59.134
79.146.185.129 20.151.116.155 101.74.217.15 183.207.106.75
74.76.186.226 207.88.109.51 5.214.233.99 157.94.78.168