Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.138.134.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.138.134.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 14:55:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
138.134.138.94.in-addr.arpa domain name pointer 94.138.134.138.impuls-perm.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.134.138.94.in-addr.arpa	name = 94.138.134.138.impuls-perm.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.84.101.187 attackbots
$f2bV_matches
2020-05-01 06:33:14
164.132.197.108 attackspam
Invalid user ks from 164.132.197.108 port 55570
2020-05-01 06:26:13
61.19.247.125 attackspambots
SASL PLAIN auth failed: ruser=...
2020-05-01 06:31:41
180.215.224.208 attackspambots
/Adminf57e0f44/Login.php
2020-05-01 06:25:42
182.254.244.11 attackbots
1433/tcp 445/tcp...
[2020-03-05/04-30]5pkt,2pt.(tcp)
2020-05-01 06:43:37
71.6.233.187 attack
Honeypot attack, port: 445, PTR: scanners.labs.rapid7.com.
2020-05-01 06:46:32
198.108.66.228 attack
12362/tcp 9234/tcp 9107/tcp...
[2020-03-02/04-30]310pkt,263pt.(tcp)
2020-05-01 06:36:41
107.170.91.121 attackbotsspam
5x Failed Password
2020-05-01 06:57:22
91.98.88.7 attack
445/tcp
[2020-04-30]1pkt
2020-05-01 06:58:31
80.98.192.64 attackspam
9530/tcp 9530/tcp
[2020-03-29/04-30]2pkt
2020-05-01 06:48:43
71.38.84.147 attackspam
Automatic report - Port Scan Attack
2020-05-01 06:49:29
104.140.211.195 attack
(From maitland.silvia@yahoo.com) Good day

DFY Suite is an established, high-quality social syndication system that allows you to get stunning content syndication 
for your videos or niche sites WITHOUT having to do ANY of the work yourself.

    +    There is NO software to download or install
    +    There is NO account creation needed on your part
    +    There is NO having to deal with proxies of captchas
    +    There are NO complicated tutorials you have to watch

DFY Suite 2 with more advanced features will become your powerful tool to serve the online marketing industry 
which gets more and more competitive. You will be able to skyrocket your business with very little effort.

MORE INFO HERE=> https://bit.ly/3eX8UtI
2020-05-01 06:53:16
221.6.22.203 attackbotsspam
k+ssh-bruteforce
2020-05-01 06:50:36
193.202.45.202 attackbotsspam
193.202.45.202 was recorded 19 times by 8 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 19, 73, 1524
2020-05-01 06:45:39
45.151.254.234 attack
about 20k SIP packets to thousands of our IPs
2020-05-01 06:29:10

Recently Reported IPs

81.134.168.166 29.40.177.221 172.167.234.245 208.193.95.69
103.169.32.15 155.145.19.157 230.200.139.96 137.159.130.76
76.243.160.213 46.61.106.185 29.223.128.245 87.44.145.235
151.106.230.16 5.219.13.93 196.98.241.66 94.140.247.41
201.147.229.138 69.77.49.177 53.223.108.70 180.108.119.232