Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.12.20.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3462
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.12.20.34.			IN	A

;; AUTHORITY SECTION:
.			476	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:54:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
34.20.12.193.in-addr.arpa is an alias for 34.0.20.12.193.in-addr.arpa.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.fi.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.no.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.se.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.com.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.dk.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.fi.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.no.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.se.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.com.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.20.12.193.in-addr.arpa	canonical name = 34.0.20.12.193.in-addr.arpa.
34.0.20.12.193.in-addr.arpa	name = www.lensway.no.
34.0.20.12.193.in-addr.arpa	name = www.lensway.se.
34.0.20.12.193.in-addr.arpa	name = www.lensway.com.
34.0.20.12.193.in-addr.arpa	name = lensway.dk.
34.0.20.12.193.in-addr.arpa	name = lensway.fi.
34.0.20.12.193.in-addr.arpa	name = lensway.no.
34.0.20.12.193.in-addr.arpa	name = lensway.se.
34.0.20.12.193.in-addr.arpa	name = lensway.com.
34.0.20.12.193.in-addr.arpa	name = www.lensway.dk.
34.0.20.12.193.in-addr.arpa	name = www.lensway.fi.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.102.51.95 attack
Port scan on 17 port(s): 3710 4085 6441 7148 12503 17424 22840 26590 35180 35776 38224 41643 41647 42622 59487 59854 61503
2020-09-06 07:30:27
77.40.3.156 attack
proto=tcp  .  spt=16066  .  dpt=25  .     Found on   Blocklist de       (166)
2020-09-06 07:41:06
92.40.195.118 attackbotsspam
Port Scan: TCP/443
2020-09-06 07:47:05
201.95.86.224 attackbots
Icarus honeypot on github
2020-09-06 07:30:11
123.201.12.190 attackbotsspam
Aug 31 07:14:39 uapps sshd[25202]: Invalid user admin from 123.201.12.190 port 55309
Aug 31 07:14:41 uapps sshd[25202]: Failed password for invalid user admin from 123.201.12.190 port 55309 ssh2
Aug 31 07:14:42 uapps sshd[25202]: Received disconnect from 123.201.12.190 port 55309:11: Bye Bye [preauth]
Aug 31 07:14:42 uapps sshd[25202]: Disconnected from invalid user admin 123.201.12.190 port 55309 [preauth]
Aug 31 07:14:43 uapps sshd[25204]: Invalid user admin from 123.201.12.190 port 55440
Aug 31 07:14:46 uapps sshd[25204]: Failed password for invalid user admin from 123.201.12.190 port 55440 ssh2
Aug 31 07:14:47 uapps sshd[25204]: Received disconnect from 123.201.12.190 port 55440:11: Bye Bye [preauth]
Aug 31 07:14:47 uapps sshd[25204]: Disconnected from invalid user admin 123.201.12.190 port 55440 [preauth]
Aug 31 07:14:48 uapps sshd[25206]: Invalid user admin from 123.201.12.190 port 55541
Aug 31 07:14:50 uapps sshd[25206]: Failed password for invalid user admin fro........
-------------------------------
2020-09-06 07:27:22
51.75.87.58 attack
2020-09-05 12:39:32.540258-0500  localhost smtpd[46585]: NOQUEUE: reject: RCPT from unknown[51.75.87.58]: 450 4.7.25 Client host rejected: cannot find your hostname, [51.75.87.58]; from= to= proto=ESMTP helo=
2020-09-06 07:37:53
171.103.190.158 attackbots
failed attempts to access the website, searching for vulnerabilities, also using following IPs: 27.37.246.129 , 94.231.218.223 , 116.90.237.125 ,  190.235.214.78 ,  190.98.53.86 , 45.170.129.135 ,  170.239.242.222 , 43.249.113.243 ,  103.140.4.87 ,  171.103.190.158 , 72.210.252.135
2020-09-06 07:35:16
36.71.190.252 attackbots
Automatic report - Port Scan Attack
2020-09-06 07:32:16
91.106.38.182 attackbotsspam
2020-09-05 11:37:41.137096-0500  localhost smtpd[41784]: NOQUEUE: reject: RCPT from unknown[91.106.38.182]: 554 5.7.1 Service unavailable; Client host [91.106.38.182] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/91.106.38.182; from= to= proto=ESMTP helo=<[91.106.38.181]>
2020-09-06 07:39:33
121.40.212.94 attackspambots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-06 07:21:04
75.162.234.20 attackbots
Brute forcing email accounts
2020-09-06 07:26:11
171.13.47.75 attackbots
Lines containing failures of 171.13.47.75 (max 1000)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=171.13.47.75
2020-09-06 07:15:41
191.240.39.77 attackspam
Sep 5 18:47:52 *host* postfix/smtps/smtpd\[6352\]: warning: unknown\[191.240.39.77\]: SASL PLAIN authentication failed:
2020-09-06 07:49:17
198.245.49.207 attack
MYH,DEF GET /admin/
2020-09-06 07:48:59
103.147.10.222 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-06 07:18:04

Recently Reported IPs

193.122.120.10 193.120.143.144 193.120.87.142 193.120.52.34
193.122.107.119 193.122.62.204 193.122.71.142 193.123.27.240
193.123.236.141 193.122.68.107 193.122.99.29 193.123.33.15
193.122.66.96 193.123.91.39 193.122.99.45 193.124.129.123
193.124.18.9 193.124.16.210 193.124.17.135 193.124.18.131