Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.2.34.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7075
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.2.34.30.			IN	A

;; AUTHORITY SECTION:
.			379	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100901 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 10 03:08:04 CST 2019
;; MSG SIZE  rcvd: 115
Host info
30.34.2.141.in-addr.arpa domain name pointer ub34030.ubffm.ub.uni-frankfurt.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.34.2.141.in-addr.arpa	name = ub34030.ubffm.ub.uni-frankfurt.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
154.8.232.205 attackspambots
Invalid user server from 154.8.232.205 port 36036
2020-03-13 21:39:04
202.139.192.83 attackspam
Mar 13 13:49:02 ewelt sshd[30888]: Invalid user flora from 202.139.192.83 port 51136
Mar 13 13:49:02 ewelt sshd[30888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.139.192.83
Mar 13 13:49:02 ewelt sshd[30888]: Invalid user flora from 202.139.192.83 port 51136
Mar 13 13:49:05 ewelt sshd[30888]: Failed password for invalid user flora from 202.139.192.83 port 51136 ssh2
...
2020-03-13 21:00:41
45.143.223.46 attackbots
Brute forcing email accounts
2020-03-13 21:35:57
138.68.234.162 attackbotsspam
Mar 13 14:03:42 ns381471 sshd[30355]: Failed password for root from 138.68.234.162 port 42726 ssh2
2020-03-13 21:34:25
157.230.253.174 attackbotsspam
Jan 29 19:03:50 pi sshd[12550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.253.174 
Jan 29 19:03:53 pi sshd[12550]: Failed password for invalid user jyotisa from 157.230.253.174 port 58812 ssh2
2020-03-13 21:16:31
156.205.196.168 attackspam
Jan 16 12:46:02 pi sshd[3769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.205.196.168 
Jan 16 12:46:04 pi sshd[3769]: Failed password for invalid user monitor from 156.205.196.168 port 57075 ssh2
2020-03-13 21:20:11
162.243.132.142 attackbotsspam
Hits on port : 3050
2020-03-13 21:05:10
89.189.156.52 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/89.189.156.52/ 
 
 RU - 1H : (106)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN24955 
 
 IP : 89.189.156.52 
 
 CIDR : 89.189.152.0/21 
 
 PREFIX COUNT : 222 
 
 UNIQUE IP COUNT : 191488 
 
 
 ATTACKS DETECTED ASN24955 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-03-13 13:48:42 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-13 21:32:04
154.90.9.31 attack
Jan 18 02:39:43 pi sshd[16161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.90.9.31 
Jan 18 02:39:45 pi sshd[16161]: Failed password for invalid user admin from 154.90.9.31 port 61503 ssh2
2020-03-13 21:33:41
61.177.172.128 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
Failed password for root from 61.177.172.128 port 58672 ssh2
Failed password for root from 61.177.172.128 port 58672 ssh2
Failed password for root from 61.177.172.128 port 58672 ssh2
Failed password for root from 61.177.172.128 port 58672 ssh2
2020-03-13 21:12:50
77.40.3.134 attack
(smtpauth) Failed SMTP AUTH login from 77.40.3.134 (RU/Russia/134.3.dialup.mari-el.ru): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-13 16:18:37 login authenticator failed for (localhost.localdomain) [77.40.3.134]: 535 Incorrect authentication data (set_id=townhall@safanicu.com)
2020-03-13 21:37:49
93.136.117.25 attackbots
Honeypot attack, port: 445, PTR: 93-136-117-25.adsl.net.t-com.hr.
2020-03-13 20:58:47
154.49.213.26 attackbots
Feb  4 22:46:15 pi sshd[23903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.49.213.26 
Feb  4 22:46:17 pi sshd[23903]: Failed password for invalid user dspace from 154.49.213.26 port 49320 ssh2
2020-03-13 21:44:56
156.251.174.83 attack
Jan 13 15:20:55 pi sshd[11573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.251.174.83 
Jan 13 15:20:57 pi sshd[11573]: Failed password for invalid user yzq from 156.251.174.83 port 47834 ssh2
2020-03-13 21:03:46
156.206.164.218 attackbots
Feb  4 17:07:58 pi sshd[21231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.206.164.218 
Feb  4 17:08:00 pi sshd[21231]: Failed password for invalid user admin from 156.206.164.218 port 34321 ssh2
2020-03-13 21:19:12

Recently Reported IPs

91.86.30.106 93.79.77.201 195.19.19.85 47.115.149.76
79.157.217.179 32.234.152.83 121.6.246.245 75.109.42.182
220.200.211.69 78.106.72.15 163.44.109.232 3.140.34.247
67.218.54.234 108.55.186.232 87.63.251.142 182.74.2.58
49.207.176.35 190.79.30.1 181.224.186.53 185.234.217.199