Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aars

Region: Region Nordjylland

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.109.192.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.109.192.34.			IN	A

;; AUTHORITY SECTION:
.			160	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060100 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 02 01:09:35 CST 2024
;; MSG SIZE  rcvd: 105
Host info
34.192.109.2.in-addr.arpa domain name pointer 2-109-192-34-static.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.192.109.2.in-addr.arpa	name = 2-109-192-34-static.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.124.166.101 attack
firewall-block, port(s): 27731/tcp
2020-07-24 00:45:22
201.86.128.156 attackspam
Jul 23 08:57:55 ws12vmsma01 sshd[37104]: Invalid user pibid from 201.86.128.156
Jul 23 08:57:58 ws12vmsma01 sshd[37104]: Failed password for invalid user pibid from 201.86.128.156 port 55119 ssh2
Jul 23 08:58:43 ws12vmsma01 sshd[37944]: Invalid user pibid from 201.86.128.156
...
2020-07-24 00:59:34
36.91.38.31 attackbots
Brute-force attempt banned
2020-07-24 01:04:45
194.78.185.79 attackbots
Unauthorized connection attempt from IP address 194.78.185.79 on Port 445(SMB)
2020-07-24 00:57:14
171.243.11.42 attack
firewall-block, port(s): 445/tcp
2020-07-24 00:39:41
193.227.5.24 attackspam
Unauthorized connection attempt from IP address 193.227.5.24 on Port 445(SMB)
2020-07-24 00:45:52
36.110.217.140 attackbots
Jul 23 16:43:36 fhem-rasp sshd[7721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.217.140
Jul 23 16:43:38 fhem-rasp sshd[7721]: Failed password for invalid user ju from 36.110.217.140 port 49548 ssh2
...
2020-07-24 00:46:31
221.194.137.28 attackspambots
Invalid user test1234 from 221.194.137.28 port 44910
2020-07-24 01:05:06
103.44.96.238 attack
Unauthorized connection attempt from IP address 103.44.96.238 on Port 445(SMB)
2020-07-24 00:33:36
125.227.236.60 attackspam
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-07-24 00:52:00
192.144.187.153 attack
$f2bV_matches
2020-07-24 00:30:34
111.231.19.44 attackspam
Jul 23 05:23:50 pixelmemory sshd[2021958]: Invalid user dbseller from 111.231.19.44 port 44478
Jul 23 05:23:50 pixelmemory sshd[2021958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.19.44 
Jul 23 05:23:50 pixelmemory sshd[2021958]: Invalid user dbseller from 111.231.19.44 port 44478
Jul 23 05:23:52 pixelmemory sshd[2021958]: Failed password for invalid user dbseller from 111.231.19.44 port 44478 ssh2
Jul 23 05:29:50 pixelmemory sshd[2027500]: Invalid user backuper from 111.231.19.44 port 47236
...
2020-07-24 00:56:31
186.4.148.195 attack
Invalid user ubuntu from 186.4.148.195 port 30118
2020-07-24 01:06:58
68.64.228.251 attackbots
Unauthorized connection attempt from IP address 68.64.228.251 on Port 445(SMB)
2020-07-24 00:50:08
186.220.67.73 attack
Invalid user solr from 186.220.67.73 port 49119
2020-07-24 01:06:45

Recently Reported IPs

149.39.201.174 162.24.14.198 86.203.197.108 2.30.2.160
63.209.33.234 218.68.137.3 2.137.22.252 2.138.33.100
2.138.53.89 2.131.65.110 151.219.129.124 2.138.26.115
99.154.149.24 2.138.37.174 2.171.103.116 29.177.123.150
64.46.58.87 2.138.28.204 3.248.137.144 2.182.153.19