Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yilan

Region: Yilan

Country: Taiwan, China

Internet Service Provider: Chunghwa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.34.72.81 attackbots
Attempted connection to port 23.
2020-08-14 06:03:17
1.34.72.160 attackspam
Unauthorized connection attempt detected from IP address 1.34.72.160 to port 81 [J]
2020-01-28 23:29:16
1.34.72.160 attackbots
Honeypot attack, port: 23, PTR: 1-34-72-160.HINET-IP.hinet.net.
2020-01-04 20:20:13
1.34.72.160 attack
Honeypot attack, port: 81, PTR: 1-34-72-160.HINET-IP.hinet.net.
2019-12-15 21:53:12
1.34.72.86 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/1.34.72.86/ 
 TW - 1H : (219)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 1.34.72.86 
 
 CIDR : 1.34.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 19 
  3H - 46 
  6H - 59 
 12H - 89 
 24H - 151 
 
 DateTime : 2019-10-01 05:51:15 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 15:36:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.34.72.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.34.72.90.			IN	A

;; AUTHORITY SECTION:
.			251	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041001 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 11 06:51:23 CST 2022
;; MSG SIZE  rcvd: 103
Host info
90.72.34.1.in-addr.arpa domain name pointer 1-34-72-90.hinet-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
90.72.34.1.in-addr.arpa	name = 1-34-72-90.hinet-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.174.2.213 attackbotsspam
23/tcp
[2019-09-29]1pkt
2019-09-30 06:57:03
92.53.65.196 attack
firewall-block, port(s): 5225/tcp
2019-09-30 07:16:07
59.25.197.146 attackspambots
Tried sshing with brute force.
2019-09-30 07:13:14
138.118.214.71 attackspam
*Port Scan* detected from 138.118.214.71 (AR/Argentina/red118.214.071-ssservicios.com.ar). 4 hits in the last 280 seconds
2019-09-30 07:25:49
103.76.21.181 attack
(sshd) Failed SSH login from 103.76.21.181 (ID/Indonesia/North Sumatra/Medan/-/[AS23947 PT.Mora Telematika Indonesia]): 1 in the last 3600 secs
2019-09-30 07:20:10
211.75.194.80 attackspam
SSH Brute Force, server-1 sshd[9203]: Failed password for invalid user teamspeak3 from 211.75.194.80 port 50764 ssh2
2019-09-30 07:14:07
187.59.164.57 attackbotsspam
Automatic report - Port Scan Attack
2019-09-30 07:02:42
23.129.64.206 attackspam
Automatc Report - XMLRPC Attack
2019-09-30 07:22:50
138.68.29.52 attackspambots
[ssh] SSH attack
2019-09-30 06:56:04
36.6.57.212 attackspambots
SSH invalid-user multiple login try
2019-09-30 06:59:02
95.217.13.119 attack
Port scan on 18 port(s): 200 800 3333 4012 4014 5003 5801 7004 7777 8084 8106 8580 8778 8881 9999 34567 50030 51510
2019-09-30 07:06:24
139.215.217.180 attack
Sep 30 01:01:51 localhost sshd\[9873\]: Invalid user webusers from 139.215.217.180 port 57622
Sep 30 01:01:51 localhost sshd\[9873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180
Sep 30 01:01:53 localhost sshd\[9873\]: Failed password for invalid user webusers from 139.215.217.180 port 57622 ssh2
2019-09-30 07:08:56
189.112.75.122 attackspam
Sep 30 01:27:37 andromeda sshd\[48851\]: Invalid user support from 189.112.75.122 port 44359
Sep 30 01:27:37 andromeda sshd\[48851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.75.122
Sep 30 01:27:39 andromeda sshd\[48851\]: Failed password for invalid user support from 189.112.75.122 port 44359 ssh2
2019-09-30 07:27:51
64.132.127.100 attackbotsspam
445/tcp
[2019-09-29]1pkt
2019-09-30 07:07:12
209.17.96.50 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-30 06:52:47

Recently Reported IPs

1.34.217.177 1.55.215.47 1.65.149.127 1.65.164.5
1.65.165.202 1.9.135.41 10.1.10.20 10.11.1.10
10.144.43.49 10.196.95.214 10.197.239.8 10.2.3.11
10.2.3.9 10.21.48.84 10.3.0.14 10.33.134.233
10.5.0.20 10.88.16.101 10.88.16.103 100.20.138.241