Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.102.94.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.102.94.34.			IN	A

;; AUTHORITY SECTION:
.			136	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110200 1800 900 604800 86400

;; Query time: 182 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 00:47:18 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 34.94.102.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.94.102.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.111.66 attackbotsspam
firewall-block, port(s): 8040/tcp
2019-11-09 21:03:55
184.95.49.154 attackbots
Automatic report - XMLRPC Attack
2019-11-09 21:39:22
106.13.81.242 attackspambots
Nov  8 21:40:11 php1 sshd\[8247\]: Invalid user karleigh from 106.13.81.242
Nov  8 21:40:11 php1 sshd\[8247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242
Nov  8 21:40:12 php1 sshd\[8247\]: Failed password for invalid user karleigh from 106.13.81.242 port 54214 ssh2
Nov  8 21:45:26 php1 sshd\[9154\]: Invalid user rator from 106.13.81.242
Nov  8 21:45:26 php1 sshd\[9154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242
2019-11-09 21:04:25
123.195.99.9 attackbotsspam
Nov  9 10:29:55 minden010 sshd[18084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.195.99.9
Nov  9 10:29:57 minden010 sshd[18084]: Failed password for invalid user basel from 123.195.99.9 port 59392 ssh2
Nov  9 10:34:15 minden010 sshd[23421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.195.99.9
...
2019-11-09 21:33:24
159.203.139.128 attack
Nov  9 13:04:33 localhost sshd\[18865\]: Invalid user lidl from 159.203.139.128 port 52154
Nov  9 13:04:33 localhost sshd\[18865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.139.128
Nov  9 13:04:35 localhost sshd\[18865\]: Failed password for invalid user lidl from 159.203.139.128 port 52154 ssh2
...
2019-11-09 21:27:41
83.175.217.26 attackspambots
Nov  9 06:38:16 web1 postfix/smtpd[4666]: warning: unknown[83.175.217.26]: SASL LOGIN authentication failed: authentication failure
...
2019-11-09 21:15:18
129.204.22.64 attack
Nov  9 02:53:15 hanapaa sshd\[21218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.22.64  user=root
Nov  9 02:53:17 hanapaa sshd\[21218\]: Failed password for root from 129.204.22.64 port 39556 ssh2
Nov  9 02:59:21 hanapaa sshd\[21703\]: Invalid user chloe from 129.204.22.64
Nov  9 02:59:21 hanapaa sshd\[21703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.22.64
Nov  9 02:59:23 hanapaa sshd\[21703\]: Failed password for invalid user chloe from 129.204.22.64 port 47878 ssh2
2019-11-09 21:04:10
165.22.195.163 attackbotsspam
Wordpress brute-force
2019-11-09 21:00:05
5.39.93.158 attack
Nov  9 10:05:13 ns381471 sshd[22673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.93.158
Nov  9 10:05:15 ns381471 sshd[22673]: Failed password for invalid user rs123 from 5.39.93.158 port 52514 ssh2
2019-11-09 21:36:49
148.66.157.84 attackspam
Automatic report - XMLRPC Attack
2019-11-09 21:19:13
160.153.156.138 attackspambots
Automatic report - XMLRPC Attack
2019-11-09 21:26:51
37.49.230.19 attackbots
37.49.230.19 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5070. Incident counter (4h, 24h, all-time): 5, 30, 41
2019-11-09 21:12:40
103.219.112.154 attackspambots
web-1 [ssh_2] SSH Attack
2019-11-09 21:32:37
185.200.118.35 attackspambots
Port scan: Attack repeated for 24 hours
2019-11-09 21:05:10
108.167.163.100 attackbots
Automatic report - XMLRPC Attack
2019-11-09 21:32:06

Recently Reported IPs

53.235.160.97 31.255.111.86 234.126.26.115 41.34.92.61
187.201.11.77 171.177.16.72 194.196.205.1 47.93.248.137
9.40.60.77 156.224.148.73 209.254.254.189 229.115.60.197
156.210.71.51 91.54.105.102 132.109.82.32 243.17.202.255
230.250.125.171 196.194.145.94 137.142.169.253 127.176.221.250