Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Krasnoyarsk

Region: Krasnoyarskiy Kray

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: CJSC Intertax

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.234.130.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19834
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.234.130.49.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 03 18:38:07 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 49.130.234.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 49.130.234.109.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
103.47.35.224 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 08-11-2019 14:35:21.
2019-11-09 03:13:35
81.12.159.146 attackbotsspam
Oct 27 15:39:21 cavern sshd[26904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.159.146
2019-11-09 03:38:38
112.85.42.180 attackbots
Oct 23 13:02:21 cavern sshd[26893]: Failed password for root from 112.85.42.180 port 36457 ssh2
2019-11-09 03:31:01
113.22.182.210 attackspam
Brute force attempt
2019-11-09 03:43:03
181.113.26.116 attackbots
Nov  8 06:34:11 auw2 sshd\[14570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.113.26.116  user=root
Nov  8 06:34:13 auw2 sshd\[14570\]: Failed password for root from 181.113.26.116 port 37339 ssh2
Nov  8 06:38:50 auw2 sshd\[14969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.113.26.116  user=root
Nov  8 06:38:53 auw2 sshd\[14969\]: Failed password for root from 181.113.26.116 port 56537 ssh2
Nov  8 06:43:31 auw2 sshd\[15494\]: Invalid user un from 181.113.26.116
2019-11-09 03:29:48
220.130.10.13 attack
Nov  2 21:07:09 cavern sshd[14019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13
2019-11-09 03:38:23
46.229.168.146 attackspambots
Malicious Traffic/Form Submission
2019-11-09 03:17:14
159.65.190.151 attack
ET SCAN NETWORK Incoming Masscan detected
2019-11-09 03:22:48
14.231.163.239 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 08-11-2019 14:35:23.
2019-11-09 03:12:59
54.39.145.31 attackbotsspam
2019-10-11 03:14:27,415 fail2ban.actions        [843]: NOTICE  [sshd] Ban 54.39.145.31
2019-10-11 06:21:52,150 fail2ban.actions        [843]: NOTICE  [sshd] Ban 54.39.145.31
2019-10-11 09:27:34,419 fail2ban.actions        [843]: NOTICE  [sshd] Ban 54.39.145.31
...
2019-11-09 03:14:04
84.229.91.70 attackbots
Brute force attempt
2019-11-09 03:32:26
129.211.131.152 attackbotsspam
2019-11-08T17:52:38.944352shield sshd\[11376\]: Invalid user elomboy from 129.211.131.152 port 58678
2019-11-08T17:52:38.948664shield sshd\[11376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.131.152
2019-11-08T17:52:40.868556shield sshd\[11376\]: Failed password for invalid user elomboy from 129.211.131.152 port 58678 ssh2
2019-11-08T17:57:05.363805shield sshd\[12000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.131.152  user=root
2019-11-08T17:57:06.606063shield sshd\[12000\]: Failed password for root from 129.211.131.152 port 48957 ssh2
2019-11-09 03:40:43
191.34.162.186 attackbots
$f2bV_matches
2019-11-09 03:36:57
166.62.85.53 attack
fail2ban honeypot
2019-11-09 03:28:23
190.203.11.199 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 08-11-2019 14:35:26.
2019-11-09 03:04:41

Recently Reported IPs

183.136.149.24 80.190.49.143 5.39.93.158 87.71.164.21
211.21.19.83 165.16.54.202 182.73.118.190 176.133.106.115
220.162.158.2 192.99.13.18 186.179.210.54 184.105.247.216
182.180.91.134 104.129.12.37 95.38.219.243 92.249.206.40
83.234.168.35 64.45.174.34 14.98.83.219 179.109.54.235