Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Telefonica Germany

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.209.34.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63321
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.209.34.57.			IN	A

;; AUTHORITY SECTION:
.			1699	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060801 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 09 04:08:09 CST 2019
;; MSG SIZE  rcvd: 115

Host info
Host 57.34.209.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 57.34.209.2.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
171.41.225.101 attack
Fri Jul 31 22:32:30 2020 \[pid 23853\] \[anonymous\] FAIL LOGIN: Client "171.41.225.101"
Fri Jul 31 22:32:34 2020 \[pid 23887\] \[www\] FAIL LOGIN: Client "171.41.225.101"
Fri Jul 31 22:32:39 2020 \[pid 23891\] \[www\] FAIL LOGIN: Client "171.41.225.101"
Fri Jul 31 22:32:44 2020 \[pid 23893\] \[www\] FAIL LOGIN: Client "171.41.225.101"
Fri Jul 31 22:32:51 2020 \[pid 23895\] \[www\] FAIL LOGIN: Client "171.41.225.101"
2020-08-01 05:47:01
79.7.229.120 attack
Unauthorized connection attempt from IP address 79.7.229.120 on Port 445(SMB)
2020-08-01 06:18:37
189.254.242.60 attackbots
Jul 31 23:38:04 *hidden* sshd[54617]: Failed password for *hidden* from 189.254.242.60 port 38602 ssh2 Jul 31 23:42:03 *hidden* sshd[55278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.254.242.60 user=root Jul 31 23:42:05 *hidden* sshd[55278]: Failed password for *hidden* from 189.254.242.60 port 50300 ssh2
2020-08-01 05:55:05
78.46.61.245 attackspam
20 attempts against mh-misbehave-ban on milky
2020-08-01 05:53:34
139.59.169.103 attackspam
Jul 31 17:21:41 ny01 sshd[10181]: Failed password for root from 139.59.169.103 port 47796 ssh2
Jul 31 17:22:53 ny01 sshd[10291]: Failed password for root from 139.59.169.103 port 38892 ssh2
2020-08-01 06:03:32
122.51.195.237 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-31T20:30:34Z and 2020-07-31T20:32:50Z
2020-08-01 05:50:48
212.72.137.221 attackspambots
jannisjulius.de 212.72.137.221 [31/Jul/2020:22:32:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4269 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
jannisjulius.de 212.72.137.221 [31/Jul/2020:22:32:46 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4269 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-08-01 05:54:40
174.135.156.170 attack
Jul 31 23:35:02 nextcloud sshd\[24701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.135.156.170  user=root
Jul 31 23:35:04 nextcloud sshd\[24701\]: Failed password for root from 174.135.156.170 port 36428 ssh2
Jul 31 23:40:11 nextcloud sshd\[30305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.135.156.170  user=root
2020-08-01 05:50:23
37.49.230.113 attack
SSH Invalid Login
2020-08-01 05:49:52
156.96.155.240 attackspambots
General vulnerability scan.
2020-08-01 05:59:38
154.221.19.210 attackspam
2020-07-31T23:51:59.204585vps773228.ovh.net sshd[2294]: Failed password for root from 154.221.19.210 port 38775 ssh2
2020-07-31T23:56:10.289296vps773228.ovh.net sshd[2296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.19.210  user=root
2020-07-31T23:56:12.762626vps773228.ovh.net sshd[2296]: Failed password for root from 154.221.19.210 port 45147 ssh2
2020-08-01T00:00:22.191666vps773228.ovh.net sshd[2313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.19.210  user=root
2020-08-01T00:00:24.258037vps773228.ovh.net sshd[2313]: Failed password for root from 154.221.19.210 port 51516 ssh2
...
2020-08-01 06:17:08
5.233.142.248 attackspam
Unauthorized connection attempt from IP address 5.233.142.248 on Port 445(SMB)
2020-08-01 06:14:01
207.244.92.6 attack
207.244.92.6 was recorded 8 times by 4 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 8, 24, 491
2020-08-01 06:21:28
222.186.30.59 attack
Aug  1 03:19:18 gw1 sshd[10564]: Failed password for root from 222.186.30.59 port 16534 ssh2
...
2020-08-01 06:21:04
152.136.137.62 attackbotsspam
Aug  1 00:07:43 santamaria sshd\[25058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.137.62  user=root
Aug  1 00:07:46 santamaria sshd\[25058\]: Failed password for root from 152.136.137.62 port 54130 ssh2
Aug  1 00:12:20 santamaria sshd\[25156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.137.62  user=root
...
2020-08-01 06:20:33

Recently Reported IPs

115.232.211.26 107.154.104.89 132.59.187.195 211.15.4.177
104.121.156.214 57.116.180.15 187.74.158.100 210.231.196.218
72.42.39.220 176.48.117.61 5.21.16.135 93.108.244.110
134.174.153.159 63.90.144.39 162.153.67.114 92.205.245.163
221.130.134.231 42.54.246.33 2.70.90.180 122.114.175.35