Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.214.64.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8132
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.214.64.34.			IN	A

;; AUTHORITY SECTION:
.			149	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 04:21:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
34.64.214.109.in-addr.arpa domain name pointer abayonne-652-1-607-34.w109-214.abo.wanadoo.fr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.64.214.109.in-addr.arpa	name = abayonne-652-1-607-34.w109-214.abo.wanadoo.fr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.232.47.194 attackbots
Sep 28 23:27:15 xxxxxxx4 sshd[18461]: Invalid user gpadmin from 165.232.47.194 port 43718
Sep 28 23:27:15 xxxxxxx4 sshd[18461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.47.194
Sep 28 23:27:17 xxxxxxx4 sshd[18461]: Failed password for invalid user gpadmin from 165.232.47.194 port 43718 ssh2
Sep 28 23:38:22 xxxxxxx4 sshd[19460]: Invalid user postgres from 165.232.47.194 port 52242
Sep 28 23:38:22 xxxxxxx4 sshd[19460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.47.194
Sep 28 23:38:24 xxxxxxx4 sshd[19460]: Failed password for invalid user postgres from 165.232.47.194 port 52242 ssh2
Sep 28 23:42:22 xxxxxxx4 sshd[20086]: Invalid user kibana from 165.232.47.194 port 37044
Sep 28 23:42:22 xxxxxxx4 sshd[20086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.47.194
Sep 28 23:42:23 xxxxxxx4 sshd[20086]: Failed password for inv........
------------------------------
2020-09-29 13:43:41
202.147.192.242 attackspambots
Sep 29 05:18:46 vm0 sshd[8622]: Failed password for root from 202.147.192.242 port 54668 ssh2
...
2020-09-29 13:41:15
161.35.236.158 attackbots
[H1] Blocked by UFW
2020-09-29 13:33:15
138.68.148.177 attackspambots
Invalid user web from 138.68.148.177 port 50132
2020-09-29 13:30:07
85.209.0.251 attackspambots
Sep 29 07:27:32 raspberrypi sshd[12468]: Failed password for root from 85.209.0.251 port 61464 ssh2
...
2020-09-29 13:32:05
46.209.4.194 attack
Sep 29 02:20:16 localhost sshd\[1154\]: Invalid user ubuntu from 46.209.4.194
Sep 29 02:20:16 localhost sshd\[1154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.209.4.194
Sep 29 02:20:18 localhost sshd\[1154\]: Failed password for invalid user ubuntu from 46.209.4.194 port 35454 ssh2
Sep 29 02:22:41 localhost sshd\[1212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.209.4.194  user=root
Sep 29 02:22:43 localhost sshd\[1212\]: Failed password for root from 46.209.4.194 port 34732 ssh2
...
2020-09-29 14:00:43
106.12.138.72 attackspam
Sep 28 10:46:38 XXX sshd[60152]: Invalid user 51.254.2.202 from 106.12.138.72 port 52994
2020-09-29 13:24:31
212.133.233.23 attackbots
Sep 28 22:40:01 mellenthin postfix/smtpd[9741]: NOQUEUE: reject: RCPT from unknown[212.133.233.23]: 554 5.7.1 Service unavailable; Client host [212.133.233.23] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/212.133.233.23 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[212.133.233.23]>
2020-09-29 13:23:06
103.122.32.99 attackbotsspam
20/9/28@17:02:36: FAIL: Alarm-Network address from=103.122.32.99
...
2020-09-29 13:55:08
67.215.237.75 attackspambots
Cops say brutal new tool is too powerful for most men (get yours here)
2020-09-29 13:34:10
23.101.156.218 attackspambots
Sep 29 06:44:40 santamaria sshd\[21664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.156.218  user=root
Sep 29 06:44:42 santamaria sshd\[21664\]: Failed password for root from 23.101.156.218 port 40000 ssh2
Sep 29 06:52:33 santamaria sshd\[21747\]: Invalid user db from 23.101.156.218
Sep 29 06:52:33 santamaria sshd\[21747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.156.218
...
2020-09-29 13:16:59
213.14.191.94 attack
Automatic report - Port Scan Attack
2020-09-29 13:19:40
192.254.74.22 attack
192.254.74.22 - - [29/Sep/2020:07:04:36 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.254.74.22 - - [29/Sep/2020:07:04:38 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.254.74.22 - - [29/Sep/2020:07:04:39 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-29 13:26:03
221.149.43.38 attackspambots
SSHD brute force attack detected by fail2ban
2020-09-29 13:28:15
221.6.206.26 attackbots
Invalid user git from 221.6.206.26 port 34818
2020-09-29 13:36:45

Recently Reported IPs

109.6.185.78 122.192.200.146 212.206.90.91 3.207.225.28
225.0.125.109 137.125.127.61 13.254.150.28 34.90.193.53
51.114.124.161 168.169.40.80 195.121.164.124 77.143.237.107
77.110.23.206 244.8.124.207 42.177.32.217 73.211.96.77
250.233.27.155 68.168.103.40 4.104.24.231 69.54.77.107