Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.130.34.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.130.34.189.			IN	A

;; AUTHORITY SECTION:
.			324	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071604 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 17 15:23:55 CST 2020
;; MSG SIZE  rcvd: 118
Host info
189.34.130.108.in-addr.arpa domain name pointer ec2-108-130-34-189.eu-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.34.130.108.in-addr.arpa	name = ec2-108-130-34-189.eu-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.105.25.88 attackbots
Oct  7 21:51:56 ws22vmsma01 sshd[244472]: Failed password for root from 51.105.25.88 port 50950 ssh2
...
2020-10-08 13:28:38
115.76.105.13 attackspambots
" "
2020-10-08 13:30:34
189.231.111.68 attack
Unauthorized connection attempt from IP address 189.231.111.68 on Port 445(SMB)
2020-10-08 13:33:55
92.57.150.133 attackbots
 TCP (SYN) 92.57.150.133:56119 -> port 445, len 44
2020-10-08 13:12:28
58.221.204.114 attackbots
Oct  8 10:47:26 lunarastro sshd[9222]: Failed password for root from 58.221.204.114 port 45754 ssh2
2020-10-08 13:47:26
106.12.47.229 attackbotsspam
2020-10-08T04:23:33.378242mail.broermann.family sshd[12096]: Failed password for root from 106.12.47.229 port 49054 ssh2
2020-10-08T04:25:29.690409mail.broermann.family sshd[12279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.229  user=root
2020-10-08T04:25:31.477129mail.broermann.family sshd[12279]: Failed password for root from 106.12.47.229 port 40646 ssh2
2020-10-08T04:27:14.853148mail.broermann.family sshd[12426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.229  user=root
2020-10-08T04:27:17.056117mail.broermann.family sshd[12426]: Failed password for root from 106.12.47.229 port 60462 ssh2
...
2020-10-08 13:39:56
49.232.114.29 attackbotsspam
SSH login attempts.
2020-10-08 13:38:52
222.35.83.46 attack
SSH Brute Force
2020-10-08 13:37:35
171.252.202.151 attack
1602103600 - 10/07/2020 22:46:40 Host: 171.252.202.151/171.252.202.151 Port: 23 TCP Blocked
...
2020-10-08 13:14:53
122.118.56.88 attackbots
Brute forcing email accounts
2020-10-08 13:43:43
206.81.12.141 attackbots
SSH login attempts.
2020-10-08 13:45:36
181.57.148.194 attackbots
20/10/8@00:40:38: FAIL: Alarm-Network address from=181.57.148.194
20/10/8@00:40:39: FAIL: Alarm-Network address from=181.57.148.194
...
2020-10-08 13:49:22
81.82.251.244 attack
Oct  8 05:36:43 vpn01 sshd[4242]: Failed password for root from 81.82.251.244 port 50825 ssh2
...
2020-10-08 13:10:31
34.93.0.165 attackbotsspam
SSH Invalid Login
2020-10-08 13:28:58
183.82.122.109 attackspambots
Unauthorized connection attempt from IP address 183.82.122.109 on Port 445(SMB)
2020-10-08 13:50:48

Recently Reported IPs

206.125.67.83 1.192.171.220 88.150.241.123 45.84.196.139
14.255.140.60 51.15.220.58 35.246.255.219 212.129.29.229
87.251.73.231 223.85.174.11 39.59.114.152 165.227.123.165
134.122.123.92 88.226.126.212 180.115.37.100 129.227.129.162
36.6.57.71 193.202.82.185 45.160.138.211 120.87.40.249