Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.45.190.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.45.190.34.			IN	A

;; AUTHORITY SECTION:
.			261	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 19:56:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
34.190.45.109.in-addr.arpa domain name pointer ip-109-45-190-34.web.vodafone.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.190.45.109.in-addr.arpa	name = ip-109-45-190-34.web.vodafone.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.246.135.60 attackbotsspam
Unauthorised access (Oct 25) SRC=113.246.135.60 LEN=40 TTL=50 ID=11006 TCP DPT=23 WINDOW=3539 SYN
2019-10-25 15:02:50
66.70.189.236 attackbots
detected by Fail2Ban
2019-10-25 15:35:45
190.13.14.125 attackbotsspam
23/tcp
[2019-10-25]1pkt
2019-10-25 15:01:35
51.144.96.67 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-10-25 15:09:46
171.38.144.37 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-25 15:01:59
122.136.136.31 attackspam
37215/tcp
[2019-10-25]1pkt
2019-10-25 15:39:47
78.218.8.168 attackspambots
88/tcp
[2019-10-25]1pkt
2019-10-25 15:07:28
77.208.67.202 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/77.208.67.202/ 
 
 ES - 1H : (38)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN12430 
 
 IP : 77.208.67.202 
 
 CIDR : 77.208.0.0/14 
 
 PREFIX COUNT : 131 
 
 UNIQUE IP COUNT : 3717120 
 
 
 ATTACKS DETECTED ASN12430 :  
  1H - 1 
  3H - 3 
  6H - 3 
 12H - 4 
 24H - 9 
 
 DateTime : 2019-10-25 05:53:18 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-25 15:22:58
118.193.31.20 attackspambots
Oct 24 20:51:38 friendsofhawaii sshd\[22019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20  user=root
Oct 24 20:51:41 friendsofhawaii sshd\[22019\]: Failed password for root from 118.193.31.20 port 60812 ssh2
Oct 24 20:57:05 friendsofhawaii sshd\[22444\]: Invalid user gate from 118.193.31.20
Oct 24 20:57:05 friendsofhawaii sshd\[22444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20
Oct 24 20:57:07 friendsofhawaii sshd\[22444\]: Failed password for invalid user gate from 118.193.31.20 port 43188 ssh2
2019-10-25 15:40:16
36.79.240.115 attack
445/tcp
[2019-10-25]1pkt
2019-10-25 15:37:59
204.216.71.67 attackspambots
1433/tcp
[2019-10-25]1pkt
2019-10-25 15:03:59
211.252.84.191 attackbots
(sshd) Failed SSH login from 211.252.84.191 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 25 07:09:56 server2 sshd[19991]: Invalid user testuser from 211.252.84.191 port 48738
Oct 25 07:09:58 server2 sshd[19991]: Failed password for invalid user testuser from 211.252.84.191 port 48738 ssh2
Oct 25 07:20:31 server2 sshd[20246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.84.191  user=root
Oct 25 07:20:33 server2 sshd[20246]: Failed password for root from 211.252.84.191 port 41876 ssh2
Oct 25 07:24:56 server2 sshd[20310]: Invalid user abdull from 211.252.84.191 port 57844
2019-10-25 15:14:56
181.118.94.57 attackbotsspam
Oct 25 09:07:30 MK-Soft-Root2 sshd[14968]: Failed password for root from 181.118.94.57 port 33460 ssh2
...
2019-10-25 15:44:27
201.145.178.126 attackspambots
81/tcp
[2019-10-25]1pkt
2019-10-25 15:30:47
95.155.25.88 attackbotsspam
Automatic report - Port Scan Attack
2019-10-25 15:12:48

Recently Reported IPs

186.73.40.193 164.225.248.211 11.17.254.31 188.87.175.44
102.123.115.178 173.252.53.87 12.186.44.33 158.164.4.132
128.8.218.33 242.43.66.29 101.117.174.7 122.21.92.136
168.125.13.159 220.172.182.159 130.252.7.74 138.133.196.152
198.213.253.145 162.52.115.236 184.123.139.2 211.231.27.38