Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.214.34.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48366
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.214.34.28.			IN	A

;; AUTHORITY SECTION:
.			3594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050600 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon May 06 20:58:12 +08 2019
;; MSG SIZE  rcvd: 115

Host info
28.34.214.3.in-addr.arpa domain name pointer ec2-3-214-34-28.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
28.34.214.3.in-addr.arpa	name = ec2-3-214-34-28.compute-1.amazonaws.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
169.89.89.2 attackspambots
445/tcp
[2019-07-03]1pkt
2019-07-03 20:15:06
118.70.127.165 attackbotsspam
445/tcp
[2019-07-03]1pkt
2019-07-03 20:44:16
188.70.0.65 attackspambots
Trying to deliver email spam, but blocked by RBL
2019-07-03 20:15:36
134.209.101.46 attackbotsspam
Jul  3 03:41:56 goofy sshd\[31356\]: Invalid user web from 134.209.101.46
Jul  3 03:41:56 goofy sshd\[31356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.101.46
Jul  3 03:41:58 goofy sshd\[31356\]: Failed password for invalid user web from 134.209.101.46 port 58864 ssh2
Jul  3 03:42:40 goofy sshd\[31387\]: Invalid user mysqlbackup from 134.209.101.46
Jul  3 03:42:40 goofy sshd\[31387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.101.46
2019-07-03 20:19:28
114.97.208.117 attack
21/tcp 21/tcp
[2019-07-03]2pkt
2019-07-03 20:07:28
36.75.143.237 attack
Unauthorised access (Jul  3) SRC=36.75.143.237 LEN=52 TTL=248 ID=12711 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-03 20:49:38
36.89.209.22 attackspambots
Jul  3 13:00:05 jane sshd\[23306\]: Invalid user dominic from 36.89.209.22 port 59192
Jul  3 13:00:05 jane sshd\[23306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.209.22
Jul  3 13:00:07 jane sshd\[23306\]: Failed password for invalid user dominic from 36.89.209.22 port 59192 ssh2
...
2019-07-03 20:20:46
175.148.116.148 attackbotsspam
2323/tcp
[2019-07-03]1pkt
2019-07-03 20:50:33
41.222.70.178 attackbots
445/tcp
[2019-07-03]1pkt
2019-07-03 20:16:30
103.99.113.89 attackbotsspam
Jul  3 09:59:28 MK-Soft-Root1 sshd\[13636\]: Invalid user nagios from 103.99.113.89 port 33670
Jul  3 09:59:28 MK-Soft-Root1 sshd\[13636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.113.89
Jul  3 09:59:29 MK-Soft-Root1 sshd\[13636\]: Failed password for invalid user nagios from 103.99.113.89 port 33670 ssh2
...
2019-07-03 20:58:11
93.81.195.214 attackbots
445/tcp
[2019-07-03]1pkt
2019-07-03 20:10:16
218.15.154.125 attack
139/tcp
[2019-07-03]1pkt
2019-07-03 20:27:44
113.161.83.69 attackbotsspam
445/tcp
[2019-07-03]1pkt
2019-07-03 20:54:15
106.12.93.191 attack
/var/log/apache/pucorp.org.log:[Wed Jul 03 05:29:27 2019] [error] [client 106.12.93.191] File does not exist: /home/ovh/www/webdav
/var/log/apache/pucorp.org.log:[Wed Jul 03 05:29:27 2019] [error] [client 106.12.93.191] File does not exist: /home/ovh/www/log.php
/var/log/apache/pucorp.org.log:[Wed Jul 03 05:29:28 2019] [error] [client 106.12.93.191] File does not exist: /home/ovh/www/hell.php
/var/log/apache/pucorp.org.log:[Wed Jul 03 05:29:28 2019] [error] [client 106.12.93.191] File does not exist: /home/ovh/www/pmd_online.php
/var/log/apache/pucorp.org.log:[Wed Jul 03 05:29:28 2019] [error] [client 106.12.93.191] File does not exist: /home/ovh/www/x.php
/var/log/apache/pucorp.org.log:[Wed Jul 03 05:29:28 2019] [error] [client 106.12.93.191] File does not exist: /home/ovh/www/shell.php
/var/log/apache/pucorp.org.log:[Wed Jul 03 05:29:28 2019] [error] [client 106.12.93.191] File does not exist: /home/ovh/www/htdocs.php
/var/log/apache/pucorp.org.log:[Wed Jul 03 05:29:29........
------------------------------
2019-07-03 20:27:10
113.160.224.112 attackspambots
445/tcp
[2019-07-03]1pkt
2019-07-03 20:21:42

Recently Reported IPs

93.166.124.65 121.122.103.59 85.25.237.79 63.94.56.123
197.60.174.192 223.67.119.81 99.165.156.27 197.224.177.253
122.190.188.83 5.189.150.29 222.89.74.156 57.115.11.82
112.187.227.252 148.0.48.72 113.159.63.16 103.248.33.55
112.175.39.160 171.234.124.146 8.101.249.227 106.13.78.171