Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cinisello Balsamo

Region: Lombardy

Country: Italy

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.34.30.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53538
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.34.30.11.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081302 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 14 09:19:06 CST 2020
;; MSG SIZE  rcvd: 114
Host info
11.30.34.2.in-addr.arpa domain name pointer net-2-34-30-11.cust.vodafonedsl.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.30.34.2.in-addr.arpa	name = net-2-34-30-11.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.6.8.227 attackspambots
Invalid user franciszek from 124.6.8.227 port 45286
2020-01-11 20:17:07
14.242.109.66 attackbots
Jan 11 05:47:09 grey postfix/smtpd\[10131\]: NOQUEUE: reject: RCPT from unknown\[14.242.109.66\]: 554 5.7.1 Service unavailable\; Client host \[14.242.109.66\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[14.242.109.66\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-11 20:30:16
190.128.198.14 attackspambots
20/1/11@06:50:25: FAIL: Alarm-Network address from=190.128.198.14
...
2020-01-11 20:31:39
54.204.33.149 attackbotsspam
Automatic report - XMLRPC Attack
2020-01-11 20:10:28
77.247.110.195 attackbots
SSH Brute-Force reported by Fail2Ban
2020-01-11 20:20:45
2.225.175.182 attackbotsspam
Jan 11 05:47:04 grey postfix/smtpd\[10127\]: NOQUEUE: reject: RCPT from 2-225-175-182.ip176.fastwebnet.it\[2.225.175.182\]: 554 5.7.1 Service unavailable\; Client host \[2.225.175.182\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[2.225.175.182\]\; from=\ to=\ proto=ESMTP helo=\<2-225-175-182.ip176.fastwebnet.it\>
...
2020-01-11 20:35:20
54.38.18.211 attack
Automatic report - SSH Brute-Force Attack
2020-01-11 20:15:16
148.66.157.84 attackspambots
Automatic report - XMLRPC Attack
2020-01-11 20:19:08
45.136.109.87 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 33 - port: 8787 proto: TCP cat: Misc Attack
2020-01-11 20:47:49
188.133.90.94 attack
SSH-bruteforce attempts
2020-01-11 20:10:59
117.103.87.129 attack
Unauthorized connection attempt from IP address 117.103.87.129 on Port 445(SMB)
2020-01-11 20:38:27
92.87.123.68 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-01-11 20:50:30
200.109.223.235 attack
Unauthorized connection attempt from IP address 200.109.223.235 on Port 445(SMB)
2020-01-11 20:21:54
116.104.137.104 attack
Unauthorized connection attempt from IP address 116.104.137.104 on Port 445(SMB)
2020-01-11 20:20:16
125.212.226.54 attackbotsspam
Jan 11 05:32:50 ns392434 sshd[2162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.226.54  user=root
Jan 11 05:32:52 ns392434 sshd[2162]: Failed password for root from 125.212.226.54 port 29569 ssh2
Jan 11 05:40:34 ns392434 sshd[2335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.226.54  user=postfix
Jan 11 05:40:35 ns392434 sshd[2335]: Failed password for postfix from 125.212.226.54 port 31326 ssh2
Jan 11 05:43:40 ns392434 sshd[2391]: Invalid user aster from 125.212.226.54 port 46416
Jan 11 05:43:40 ns392434 sshd[2391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.226.54
Jan 11 05:43:40 ns392434 sshd[2391]: Invalid user aster from 125.212.226.54 port 46416
Jan 11 05:43:42 ns392434 sshd[2391]: Failed password for invalid user aster from 125.212.226.54 port 46416 ssh2
Jan 11 05:46:49 ns392434 sshd[2469]: Invalid user vvh from 125.212.226.54 port 4147
2020-01-11 20:46:16

Recently Reported IPs

193.229.96.123 54.226.52.156 92.141.37.201 192.106.218.110
65.232.52.48 84.249.221.129 110.206.183.167 212.15.62.92
119.33.70.210 47.216.92.57 217.225.43.154 12.15.129.237
75.62.40.23 99.94.90.8 5.88.10.136 27.179.0.97
144.202.92.186 109.119.7.143 207.74.37.202 1.219.77.112