Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.34.109.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12301
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.34.109.221.			IN	A

;; AUTHORITY SECTION:
.			292	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092401 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 25 06:55:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
221.109.34.1.in-addr.arpa domain name pointer 1-34-109-221.hinet-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.109.34.1.in-addr.arpa	name = 1-34-109-221.hinet-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.67.76.63 attackspam
--- report ---
Dec 26 16:57:53 sshd: Connection from 114.67.76.63 port 47292
Dec 26 16:58:14 sshd: Invalid user hn from 114.67.76.63
Dec 26 16:58:16 sshd: Failed password for invalid user hn from 114.67.76.63 port 47292 ssh2
Dec 26 16:58:16 sshd: Received disconnect from 114.67.76.63: 11: Bye Bye [preauth]
2019-12-27 04:34:28
202.126.88.50 attackspam
Unauthorized connection attempt detected from IP address 202.126.88.50 to port 445
2019-12-27 04:52:23
37.187.122.195 attackspambots
Dec 26 15:48:05 MK-Soft-Root1 sshd[7552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195 
Dec 26 15:48:07 MK-Soft-Root1 sshd[7552]: Failed password for invalid user eleanoor from 37.187.122.195 port 37092 ssh2
...
2019-12-27 04:57:23
1.213.195.154 attackspam
Dec 26 16:08:24 ws22vmsma01 sshd[52554]: Failed password for root from 1.213.195.154 port 40638 ssh2
...
2019-12-27 04:23:58
45.172.189.15 attack
Automatic report - Port Scan Attack
2019-12-27 04:51:05
219.89.117.89 attackbots
IP blocked
2019-12-27 04:54:36
117.86.148.199 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-12-27 04:55:53
60.182.189.30 attackbotsspam
Lines containing failures of 60.182.189.30


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=60.182.189.30
2019-12-27 04:37:06
178.128.72.80 attackspambots
Invalid user Tuuli from 178.128.72.80 port 47658
2019-12-27 04:46:55
46.188.82.11 attackspam
2019-12-26 11:50:51 H=(broadband-46-188-82-11.2com.net) [46.188.82.11]:40031 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-12-26 11:50:51 H=(broadband-46-188-82-11.2com.net) [46.188.82.11]:40031 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-12-26 11:50:51 H=(broadband-46-188-82-11.2com.net) [46.188.82.11]:40031 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-12-27 04:32:57
119.29.129.88 attack
$f2bV_matches
2019-12-27 04:19:38
78.190.4.104 attack
Dec 26 15:41:09 m3061 sshd[7166]: reveeclipse mapping checking getaddrinfo for 78.190.4.104.static.ttnet.com.tr [78.190.4.104] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec 26 15:41:09 m3061 sshd[7166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.190.4.104  user=r.r
Dec 26 15:41:12 m3061 sshd[7166]: Failed password for r.r from 78.190.4.104 port 31051 ssh2
Dec 26 15:41:12 m3061 sshd[7166]: Connection closed by 78.190.4.104 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=78.190.4.104
2019-12-27 04:34:15
103.253.42.52 attackspam
Dec 26 15:48:38 web1 postfix/smtpd[28106]: warning: unknown[103.253.42.52]: SASL LOGIN authentication failed: authentication failure
...
2019-12-27 04:49:49
112.163.19.153 attack
Telnet/23 MH Probe, BF, Hack -
2019-12-27 04:57:11
187.174.237.26 attack
Unauthorized connection attempt detected from IP address 187.174.237.26 to port 445
2019-12-27 04:44:32

Recently Reported IPs

1.33.219.86 1.33.130.50 1.33.249.143 1.33.193.84
1.33.241.239 1.33.18.217 1.33.63.39 1.33.42.249
1.34.0.237 1.33.84.88 1.33.124.117 1.33.163.182
1.33.73.141 1.33.154.25 1.33.155.96 1.34.158.177
1.32.71.251 1.33.41.122 1.33.152.211 1.33.40.159