Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Plavec

Region: South Moravian

Country: Czechia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.211.34.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55891
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.211.34.82.			IN	A

;; AUTHORITY SECTION:
.			386	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110901 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 10 15:35:18 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 82.34.211.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.34.211.213.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
188.146.175.89 attackspambots
Autoban   188.146.175.89 AUTH/CONNECT
2019-07-22 10:27:14
113.190.242.144 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-22 10:40:12
188.146.165.105 attackbots
Autoban   188.146.165.105 AUTH/CONNECT
2019-07-22 10:27:50
24.227.36.74 attackspambots
Jul 22 04:35:31 OPSO sshd\[21716\]: Invalid user mailman1 from 24.227.36.74 port 50960
Jul 22 04:35:31 OPSO sshd\[21716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.227.36.74
Jul 22 04:35:33 OPSO sshd\[21716\]: Failed password for invalid user mailman1 from 24.227.36.74 port 50960 ssh2
Jul 22 04:40:22 OPSO sshd\[22600\]: Invalid user new from 24.227.36.74 port 47202
Jul 22 04:40:22 OPSO sshd\[22600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.227.36.74
2019-07-22 10:55:33
13.115.249.125 attackbots
Jul 21 16:26:21 euve59663 sshd[5431]: Invalid user ben from 13.115.249.=
125
Jul 21 16:26:21 euve59663 sshd[5431]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3Dem3-=
13-115-249-125.ap-northeast-1.compute.amazonaws.com=20
Jul 21 16:26:23 euve59663 sshd[5431]: Failed password for invalid user =
ben from 13.115.249.125 port 38380 ssh2
Jul 21 16:26:23 euve59663 sshd[5431]: Received disconnect from 13.115.2=
49.125: 11: Bye Bye [preauth]
Jul 21 16:53:06 euve59663 sshd[1138]: Connection closed by 13.115.249.1=
25 [preauth]
Jul 21 16:58:49 euve59663 sshd[1211]: Connection closed by 13.115.249.1=
25 [preauth]
Jul 21 17:05:35 euve59663 sshd[29395]: Connection closed by 13.115.249.=
125 [preauth]
Jul 21 17:11:34 euve59663 sshd[29461]: Connection closed by 13.115.249.=
125 [preauth]
Jul 21 17:17:46 euve59663 sshd[29513]: Connection closed by 13.115.249.=
125 [preauth]
Jul 21 17:24:26 euve59663 sshd[29565]: Connection closed ........
-------------------------------
2019-07-22 10:50:58
202.79.168.8 attackspam
20 attempts against mh-ssh on land.magehost.pro
2019-07-22 10:46:58
187.189.11.94 attackspam
Autoban   187.189.11.94 AUTH/CONNECT
2019-07-22 11:02:39
188.125.205.31 attackspambots
Autoban   188.125.205.31 AUTH/CONNECT
2019-07-22 10:29:38
51.255.35.58 attackspambots
Jul 22 04:38:05 srv03 sshd\[3623\]: Invalid user test from 51.255.35.58 port 36399
Jul 22 04:38:05 srv03 sshd\[3623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58
Jul 22 04:38:07 srv03 sshd\[3623\]: Failed password for invalid user test from 51.255.35.58 port 36399 ssh2
2019-07-22 10:43:04
189.90.255.173 attackspambots
Jul 21 23:32:21 localhost sshd\[730\]: Invalid user ts from 189.90.255.173 port 46867
Jul 21 23:32:21 localhost sshd\[730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.255.173
Jul 21 23:32:24 localhost sshd\[730\]: Failed password for invalid user ts from 189.90.255.173 port 46867 ssh2
2019-07-22 11:05:04
18.85.192.253 attack
2019-07-09T10:28:13.022349wiz-ks3 sshd[27678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=wholesomeserver.media.mit.edu  user=root
2019-07-09T10:28:15.142747wiz-ks3 sshd[27678]: Failed password for root from 18.85.192.253 port 38378 ssh2
2019-07-09T10:28:17.018234wiz-ks3 sshd[27678]: Failed password for root from 18.85.192.253 port 38378 ssh2
2019-07-09T10:28:13.022349wiz-ks3 sshd[27678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=wholesomeserver.media.mit.edu  user=root
2019-07-09T10:28:15.142747wiz-ks3 sshd[27678]: Failed password for root from 18.85.192.253 port 38378 ssh2
2019-07-09T10:28:17.018234wiz-ks3 sshd[27678]: Failed password for root from 18.85.192.253 port 38378 ssh2
2019-07-09T10:28:13.022349wiz-ks3 sshd[27678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=wholesomeserver.media.mit.edu  user=root
2019-07-09T10:28:15.142747wiz-ks3 sshd[27678]: Failed password for r
2019-07-22 10:23:16
188.146.167.219 attackspam
Autoban   188.146.167.219 AUTH/CONNECT
2019-07-22 10:27:32
187.85.214.44 attackspam
Autoban   187.85.214.44 AUTH/CONNECT
2019-07-22 10:41:32
188.146.227.59 attack
Autoban   188.146.227.59 AUTH/CONNECT
2019-07-22 10:25:59
187.190.166.0 attackspam
Autoban   187.190.166.0 AUTH/CONNECT
2019-07-22 10:57:28

Recently Reported IPs

213.211.34.87 51.254.31.255 202.29.20.214 115.217.236.100
49.235.209.223 47.103.195.3 46.242.10.11 46.101.216.34
213.248.51.58 198.1.65.159 167.71.121.36 151.40.209.27
60.250.149.19 49.51.8.99 47.247.147.60 213.47.255.212
210.134.56.109 194.67.92.126 186.212.75.158 186.193.19.170