Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.30.196.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.30.196.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 19:27:56 CST 2025
;; MSG SIZE  rcvd: 105
Host info
68.196.30.34.in-addr.arpa domain name pointer 68.196.30.34.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.196.30.34.in-addr.arpa	name = 68.196.30.34.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.51.66.69 attack
Unauthorized connection attempt detected from IP address 42.51.66.69 to port 1433
2020-01-02 22:09:33
222.73.85.76 attackbotsspam
Jan  2 13:11:52 debian-2gb-nbg1-2 kernel: \[226442.465607\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.73.85.76 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=49484 PROTO=TCP SPT=43838 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-02 22:12:53
183.134.209.130 attackspambots
Unauthorized connection attempt detected from IP address 183.134.209.130 to port 1433
2020-01-02 22:17:10
120.27.27.69 attack
Unauthorized connection attempt detected from IP address 120.27.27.69 to port 23
2020-01-02 21:57:24
47.97.103.214 attackbotsspam
Unauthorized connection attempt detected from IP address 47.97.103.214 to port 1433
2020-01-02 22:08:17
111.75.220.51 attack
Unauthorized connection attempt detected from IP address 111.75.220.51 to port 445
2020-01-02 22:30:36
62.32.66.190 attackspambots
Unauthorized connection attempt detected from IP address 62.32.66.190 to port 445
2020-01-02 22:04:01
27.77.129.141 attackspam
Unauthorized connection attempt detected from IP address 27.77.129.141 to port 445
2020-01-02 22:10:21
118.71.244.221 attackbotsspam
Unauthorized connection attempt detected from IP address 118.71.244.221 to port 445
2020-01-02 22:25:06
118.70.131.246 attackspam
Unauthorized connection attempt detected from IP address 118.70.131.246 to port 445
2020-01-02 22:26:11
218.108.188.226 attackspam
Unauthorized connection attempt detected from IP address 218.108.188.226 to port 1433
2020-01-02 22:14:04
118.102.26.248 attackspam
Unauthorized connection attempt detected from IP address 118.102.26.248 to port 1433
2020-01-02 22:24:44
42.113.229.134 attackbots
Unauthorized connection attempt detected from IP address 42.113.229.134 to port 23
2020-01-02 22:08:46
123.160.234.39 attackbotsspam
Unauthorized connection attempt detected from IP address 123.160.234.39 to port 85
2020-01-02 22:21:27
106.75.2.200 attackbots
Unauthorized connection attempt detected from IP address 106.75.2.200 to port 8443
2020-01-02 22:32:45

Recently Reported IPs

165.2.252.89 184.19.23.41 195.158.42.70 94.232.89.149
167.149.203.247 177.21.89.110 175.161.15.44 252.221.123.109
165.124.237.125 100.84.14.199 16.111.80.127 96.204.36.219
255.23.205.33 188.12.86.233 3.116.79.200 58.56.52.42
36.74.242.235 146.46.194.89 184.87.186.130 44.222.114.165