Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: Data Communication Business Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.34.30.9 attackspam
" "
2020-07-28 18:08:21
1.34.30.151 attack
23/tcp 81/tcp 81/tcp
[2020-03-01/04-12]3pkt
2020-04-13 07:10:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.34.30.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60685
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.34.30.55.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 13 03:33:38 CST 2019
;; MSG SIZE  rcvd: 114
Host info
55.30.34.1.in-addr.arpa domain name pointer 1-34-30-55.HINET-IP.hinet.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
55.30.34.1.in-addr.arpa	name = 1-34-30-55.HINET-IP.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.155.43.222 attackspam
Jul 22 22:56:33 propaganda sshd[60381]: Connection from 139.155.43.222 port 42908 on 10.0.0.160 port 22 rdomain ""
Jul 22 22:56:35 propaganda sshd[60381]: Connection closed by 139.155.43.222 port 42908 [preauth]
2020-07-23 15:10:17
189.163.26.205 attackspambots
Invalid user pi from 189.163.26.205 port 51250
2020-07-23 15:46:29
189.203.72.138 attack
$f2bV_matches
2020-07-23 15:15:49
149.202.161.57 attackbotsspam
Jul 23 08:45:09 web sshd[56372]: Invalid user remote from 149.202.161.57 port 47028
Jul 23 08:45:11 web sshd[56372]: Failed password for invalid user remote from 149.202.161.57 port 47028 ssh2
Jul 23 08:55:23 web sshd[56392]: Invalid user postgres from 149.202.161.57 port 58144
...
2020-07-23 15:14:44
106.13.147.89 attack
Invalid user katya from 106.13.147.89 port 51138
2020-07-23 15:25:44
139.59.87.250 attackspambots
Jul 23 08:18:54 ajax sshd[1541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.87.250 
Jul 23 08:18:56 ajax sshd[1541]: Failed password for invalid user zenoss from 139.59.87.250 port 57300 ssh2
2020-07-23 15:20:57
177.135.103.54 attackbotsspam
Attempted Brute Force (dovecot)
2020-07-23 15:20:33
150.109.50.166 attackspambots
$f2bV_matches
2020-07-23 15:09:26
223.226.32.207 attackspambots
Invalid user el from 223.226.32.207 port 41936
2020-07-23 15:27:58
118.100.187.67 attack
$f2bV_matches
2020-07-23 15:28:18
118.25.27.67 attack
Invalid user rakesh from 118.25.27.67 port 33436
2020-07-23 15:21:43
222.186.175.169 attackbotsspam
Jul 23 09:37:26 minden010 sshd[6655]: Failed password for root from 222.186.175.169 port 35050 ssh2
Jul 23 09:37:30 minden010 sshd[6655]: Failed password for root from 222.186.175.169 port 35050 ssh2
Jul 23 09:37:35 minden010 sshd[6655]: Failed password for root from 222.186.175.169 port 35050 ssh2
Jul 23 09:37:39 minden010 sshd[6655]: Failed password for root from 222.186.175.169 port 35050 ssh2
...
2020-07-23 15:45:05
210.245.34.243 attackbots
Invalid user hana from 210.245.34.243 port 55577
2020-07-23 15:34:51
187.185.224.2 attackspam
Jul 23 06:55:50 sso sshd[21348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.185.224.2
Jul 23 06:55:51 sso sshd[21348]: Failed password for invalid user charlie from 187.185.224.2 port 33155 ssh2
...
2020-07-23 15:20:09
189.7.81.29 attackbots
SSH Brute Force
2020-07-23 15:27:05

Recently Reported IPs

24.107.102.15 23.247.98.138 154.49.185.20 70.194.111.58
198.71.7.3 145.129.71.81 82.98.245.190 181.141.115.213
124.161.66.34 128.9.247.195 112.17.87.74 76.68.130.107
125.34.114.127 134.250.70.184 54.36.148.64 32.128.86.55
85.219.192.120 35.28.5.79 27.191.243.78 187.180.167.131