Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Noboribetsu

Region: Hokkaidō

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.19.34.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.19.34.211.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 11:25:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 211.34.19.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 211.34.19.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
160.34.9.48 attackbotsspam
Bad bot/spoofed identity
2020-08-01 23:54:24
84.17.51.142 attack
(From no-replynen@google.com) Gооd dаy! 
If you want to get ahead of your competition, have a higher Domain Authority score. Its just simple as that. 
With our service you get Domain Authority above 50 points in just 30 days. 
 
This service is guaranteed 
 
For more information, check our service here 
https://www.monkeydigital.co/Get-Guaranteed-Domain-Authority-50/ 
 
thank you 
Mike Ogden
 
Monkey Digital 
support@monkeydigital.co
2020-08-02 00:11:49
95.42.138.58 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-01 23:43:17
103.143.167.239 attackbotsspam
Email rejected due to spam filtering
2020-08-01 23:38:18
192.241.234.95 attackbotsspam
ET SCAN Suspicious inbound to PostgreSQL port 5432 - port: 5432 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-08-01 23:30:55
177.124.40.7 attack
Unauthorised access (Aug  1) SRC=177.124.40.7 LEN=40 TTL=242 ID=39626 TCP DPT=445 WINDOW=1024 SYN
2020-08-01 23:59:21
87.247.102.142 attackspam
Automatic report - Banned IP Access
2020-08-01 23:36:56
112.212.60.88 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 00:13:53
117.67.225.124 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 00:20:56
139.170.150.251 attackbots
2020-07-26T19:52:30.073949correo.[domain] sshd[19763]: Invalid user study from 139.170.150.251 port 45561 2020-07-26T19:52:32.407690correo.[domain] sshd[19763]: Failed password for invalid user study from 139.170.150.251 port 45561 ssh2 2020-07-26T19:59:38.872002correo.[domain] sshd[20987]: Invalid user http from 139.170.150.251 port 39882 ...
2020-08-01 23:54:41
27.79.159.130 attack
1596284411 - 08/01/2020 14:20:11 Host: 27.79.159.130/27.79.159.130 Port: 445 TCP Blocked
2020-08-01 23:44:17
45.129.33.24 attack
 TCP (SYN) 45.129.33.24:45493 -> port 21518, len 44
2020-08-01 23:47:37
141.226.10.248 attack
Email rejected due to spam filtering
2020-08-02 00:08:02
45.148.10.87 attack
Brute forcing email accounts
2020-08-01 23:39:00
122.117.113.166 attack
firewall-block, port(s): 23/tcp
2020-08-01 23:34:47

Recently Reported IPs

96.187.232.158 125.110.202.218 212.127.161.55 50.226.49.89
148.225.252.223 120.87.137.239 41.221.160.221 34.247.32.118
34.216.143.181 153.251.197.161 95.63.151.224 167.4.119.17
222.150.7.151 189.197.205.237 212.14.137.228 6.93.188.114
38.187.79.234 24.139.144.2 167.28.40.246 212.131.18.2