Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.168.118.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48461
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.168.118.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 06 12:14:36 CST 2019
;; MSG SIZE  rcvd: 118
Host info
34.118.168.109.in-addr.arpa domain name pointer 34.118.168.109.host.static.ip.kpnqwest.it.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
34.118.168.109.in-addr.arpa	name = 34.118.168.109.host.static.ip.kpnqwest.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
39.105.182.55 attackbots
Brute forcing RDP port 3389
2019-12-28 06:06:25
177.81.208.40 attackbots
3x Failed Password
2019-12-28 06:21:24
51.83.45.65 attack
Dec 27 16:51:42 mail sshd\[11646\]: Invalid user creasman from 51.83.45.65
Dec 27 16:51:42 mail sshd\[11646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.45.65
...
2019-12-28 06:14:07
206.81.0.199 attackspambots
3389BruteforceFW23
2019-12-28 06:17:42
87.255.194.41 attackspam
12/27/2019-22:13:16.396240 87.255.194.41 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-28 06:05:43
106.15.46.65 attackbots
SIP/5060 Probe, BF, Hack -
2019-12-28 06:11:22
106.75.61.203 attackspambots
SIP/5060 Probe, BF, Hack -
2019-12-28 05:55:18
54.39.151.22 attackspambots
Unauthorized connection attempt detected from IP address 54.39.151.22 to port 22
2019-12-28 05:53:04
170.231.176.13 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-28 06:10:15
167.114.47.68 attackbots
1577479197 - 12/27/2019 21:39:57 Host: 167.114.47.68/167.114.47.68 Port: 22 TCP Blocked
2019-12-28 05:59:35
198.12.156.214 attack
WordPress wp-login brute force :: 198.12.156.214 0.168 - [27/Dec/2019:18:09:14  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2019-12-28 06:04:21
129.28.78.8 attack
2019-12-27T15:31:37.489007shield sshd\[30598\]: Invalid user smmsp from 129.28.78.8 port 34872
2019-12-27T15:31:37.493420shield sshd\[30598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.78.8
2019-12-27T15:31:39.743513shield sshd\[30598\]: Failed password for invalid user smmsp from 129.28.78.8 port 34872 ssh2
2019-12-27T15:36:03.709690shield sshd\[31090\]: Invalid user adeline from 129.28.78.8 port 56920
2019-12-27T15:36:03.714013shield sshd\[31090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.78.8
2019-12-28 06:09:51
104.140.188.30 attack
firewall-block, port(s): 3389/tcp
2019-12-28 06:12:11
187.176.4.97 attackbotsspam
Honeypot attack, port: 23, PTR: 187-176-4-97.static.axtel.net.
2019-12-28 05:53:53
124.30.44.214 attackspam
Dec 27 19:50:54 localhost sshd[13260]: Failed password for root from 124.30.44.214 port 23870 ssh2
Dec 27 20:00:29 localhost sshd[13753]: Failed password for root from 124.30.44.214 port 27206 ssh2
Dec 27 20:03:25 localhost sshd[13845]: Failed password for root from 124.30.44.214 port 27518 ssh2
2019-12-28 06:16:17

Recently Reported IPs

191.248.138.222 179.128.93.126 24.172.88.240 161.237.222.70
221.61.68.125 214.3.144.70 138.118.123.248 141.229.104.83
134.73.76.46 86.97.54.162 14.232.122.247 138.68.208.51
222.45.16.249 113.123.46.140 145.226.189.194 32.31.22.204
54.92.73.118 50.120.6.131 110.88.25.14 122.102.26.168