Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '101.34.0.0 - 101.35.255.255'

% Abuse contact for '101.34.0.0 - 101.35.255.255' is 'abuse@tencent.com'

inetnum:        101.34.0.0 - 101.35.255.255
netname:        TENCENT-CN
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
country:        CN
org:            ORG-TCCC1-AP
admin-c:        TCA15-AP
tech-c:         TCA15-AP
abuse-c:        AT992-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TENCENT-CN
mnt-routes:     MAINT-TENCENT-CN
mnt-irt:        IRT-TENCENT-CN
last-modified:  2020-07-22T13:11:01Z
source:         APNIC

irt:            IRT-TENCENT-CN
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
e-mail:         tencent_noc@tencent.com
abuse-mailbox:  abuse@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
auth:           # Filtered
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        tencent_noc@tencent.com was validated on 2025-10-29
mnt-by:         MAINT-COMSENZ1-CN
last-modified:  2025-11-18T00:31:31Z
source:         APNIC

organisation:   ORG-TCCC1-AP
org-name:       Tencent Cloud Computing (Beijing) Co., Ltd
org-type:       LIR
country:        CN
address:        309 West Zone, 3F. 49 Zhichun Road. Haidian District.
phone:          +86-10-62671299
fax-no:         +86-10-82602088-41299
e-mail:         tencent_idc@tencent.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:21Z
source:         APNIC

role:           ABUSE TENCENTCN
country:        ZZ
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
phone:          +000000000
e-mail:         tencent_noc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
nic-hdl:        AT992-AP
remarks:        Generated from irt object IRT-TENCENT-CN
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        tencent_noc@tencent.com was validated on 2025-10-29
abuse-mailbox:  abuse@tencent.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-29T07:07:38Z
source:         APNIC

role:           Tencent Cloud administrator
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
country:        CN
phone:          +86-10-62671299
e-mail:         tencent_idc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
nic-hdl:        TCA15-AP
mnt-by:         MAINT-AP-DIALPAD
fax-no:         +86-10-62671299
last-modified:  2017-04-04T10:34:03Z
source:         APNIC

% Information related to '101.34.0.0/15AS45090'

route:          101.34.0.0/15
origin:         AS45090
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
                309 West Zone, 3F. 49 Zhichun Road. Haidian District.
mnt-by:         MAINT-TENCENT-CN
last-modified:  2020-02-24T07:34:07Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.34.215.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.34.215.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 06:30:34 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 105.215.34.101.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.215.34.101.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.240.208.26 attack
188.240.208.26 - - [31/Jul/2020:11:13:43 +0100] "POST /wp-login.php HTTP/1.1" 200 5645 "https://bowwowtech.co.uk/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.90 Safari/537.36 2345Explorer/9.3.2.17331"
188.240.208.26 - - [31/Jul/2020:11:13:44 +0100] "POST /wp-login.php HTTP/1.1" 200 5645 "https://bowwowtech.co.uk/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.90 Safari/537.36 2345Explorer/9.3.2.17331"
188.240.208.26 - - [31/Jul/2020:11:13:45 +0100] "POST /wp-login.php HTTP/1.1" 200 5645 "https://bowwowtech.co.uk/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.90 Safari/537.36 2345Explorer/9.3.2.17331"
...
2020-07-31 18:18:26
50.62.177.206 attack
Automatic report - XMLRPC Attack
2020-07-31 18:31:37
190.83.84.210 attackspambots
Invalid user rhino from 190.83.84.210 port 41124
2020-07-31 18:03:26
222.186.42.57 attack
Unauthorized connection attempt detected from IP address 222.186.42.57 to port 22
2020-07-31 17:58:54
222.237.104.20 attackbots
Lines containing failures of 222.237.104.20
Jul 30 18:03:26 nbi-636 sshd[7660]: Invalid user ubuntu from 222.237.104.20 port 43324
Jul 30 18:03:26 nbi-636 sshd[7660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.237.104.20 
Jul 30 18:03:29 nbi-636 sshd[7660]: Failed password for invalid user ubuntu from 222.237.104.20 port 43324 ssh2
Jul 30 18:03:31 nbi-636 sshd[7660]: Received disconnect from 222.237.104.20 port 43324:11: Bye Bye [preauth]
Jul 30 18:03:31 nbi-636 sshd[7660]: Disconnected from invalid user ubuntu 222.237.104.20 port 43324 [preauth]
Jul 30 18:06:28 nbi-636 sshd[8241]: Invalid user qinqin from 222.237.104.20 port 60814
Jul 30 18:06:28 nbi-636 sshd[8241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.237.104.20 
Jul 30 18:06:30 nbi-636 sshd[8241]: Failed password for invalid user qinqin from 222.237.104.20 port 60814 ssh2


........
-----------------------------------------------
https://www.blocklist.de
2020-07-31 18:20:00
218.82.95.99 attackbotsspam
Jul3105:46:47server2pure-ftpd:\(\?@218.82.95.99\)[WARNING]Authenticationfailedforuser[anonymous]Jul3105:47:00server2pure-ftpd:\(\?@218.82.95.99\)[WARNING]Authenticationfailedforuser[www]Jul3105:48:34server2pure-ftpd:\(\?@218.82.95.99\)[WARNING]Authenticationfailedforuser[www]Jul3105:48:45server2pure-ftpd:\(\?@218.82.95.99\)[WARNING]Authenticationfailedforuser[www]Jul3105:48:52server2pure-ftpd:\(\?@218.82.95.99\)[WARNING]Authenticationfailedforuser[www]
2020-07-31 18:20:41
117.14.8.243 attackbots
Port Scan detected!
...
2020-07-31 18:22:29
106.51.76.115 attackspambots
$f2bV_matches
2020-07-31 18:14:21
78.46.61.245 attackbots
20 attempts against mh-misbehave-ban on twig
2020-07-31 18:05:21
159.203.176.82 attackbots
CMS (WordPress or Joomla) login attempt.
2020-07-31 17:55:04
93.151.179.67 attackbotsspam
Jul 31 12:12:38 ns381471 sshd[13655]: Failed password for root from 93.151.179.67 port 41198 ssh2
2020-07-31 18:34:04
180.71.47.198 attackbotsspam
2020-07-31T10:01:26.262466shield sshd\[13790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198  user=root
2020-07-31T10:01:28.174273shield sshd\[13790\]: Failed password for root from 180.71.47.198 port 50408 ssh2
2020-07-31T10:05:51.614638shield sshd\[15003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198  user=root
2020-07-31T10:05:53.571840shield sshd\[15003\]: Failed password for root from 180.71.47.198 port 33946 ssh2
2020-07-31T10:10:12.415478shield sshd\[15960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198  user=root
2020-07-31 18:26:40
217.182.141.253 attack
Jul 31 12:09:21 mellenthin sshd[5932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.141.253  user=root
Jul 31 12:09:24 mellenthin sshd[5932]: Failed password for invalid user root from 217.182.141.253 port 47196 ssh2
2020-07-31 18:18:03
51.77.220.127 attackbotsspam
51.77.220.127 - - [31/Jul/2020:14:25:42 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-07-31 18:32:29
41.79.19.24 attackspambots
failed_logins
2020-07-31 18:05:43

Recently Reported IPs

14.212.68.169 68.237.134.66 47.91.238.135 216.180.246.237
34.38.252.90 147.185.133.218 52.212.187.55 121.230.89.139
2606:4700:10::6814:9765 2606:4700:10::6816:820 2606:4700:10::6814:9022 2606:4700:10::6816:2245
2606:4700:10::6814:9970 208.122.67.22 207.200.240.143 159.65.42.149
2606:4700:10::6814:6620 2606:4700:10::6814:9784 2606:4700:10::6816:4647 2606:4700:10::6816:3638