Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       3.128.0.0 - 3.255.255.255
CIDR:           3.128.0.0/9
NetName:        AT-88-Z
NetHandle:      NET-3-128-0-0-1
Parent:         NET3 (NET-3-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Amazon Technologies Inc. (AT-88-Z)
RegDate:        2018-06-25
Updated:        2018-09-13
Ref:            https://rdap.arin.net/registry/ip/3.128.0.0



OrgName:        Amazon Technologies Inc.
OrgId:          AT-88-Z
Address:        410 Terry Ave N.
City:           Seattle
StateProv:      WA
PostalCode:     98109
Country:        US
RegDate:        2011-12-08
Updated:        2024-01-24
Comment:        All abuse reports MUST include:
Comment:        * src IP
Comment:        * dest IP (your IP)
Comment:        * dest port
Comment:        * Accurate date/timestamp and timezone of activity
Comment:        * Intensity/frequency (short log extracts)
Comment:        * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref:            https://rdap.arin.net/registry/entity/AT-88-Z


OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName:   IP Routing
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPROU3-ARIN

OrgRoutingHandle: ARMP-ARIN
OrgRoutingName:   AWS RPKI Management POC
OrgRoutingPhone:  +1-206-555-0000 
OrgRoutingEmail:  aws-rpki-routing-poc@amazon.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ARMP-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

# end


# start

NetRange:       3.208.0.0 - 3.223.255.255
CIDR:           3.208.0.0/12
NetName:        AMAZON-IAD
NetHandle:      NET-3-208-0-0-1
Parent:         AT-88-Z (NET-3-128-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Amazon Data Services Northern Virginia (ADSN-1)
RegDate:        2018-12-18
Updated:        2018-12-18
Ref:            https://rdap.arin.net/registry/ip/3.208.0.0



OrgName:        Amazon Data Services Northern Virginia
OrgId:          ADSN-1
Address:        13200 Woodland Park Road
City:           Herndon
StateProv:      VA
PostalCode:     20171
Country:        US
RegDate:        2018-04-25
Updated:        2025-08-14
Ref:            https://rdap.arin.net/registry/entity/ADSN-1


OrgTechHandle: ANO24-ARIN
OrgTechName:   Amazon EC2 Network Operations
OrgTechPhone:  +1-206-555-0000 
OrgTechEmail:  amzn-noc-contact@amazon.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANO24-ARIN

OrgNOCHandle: AANO1-ARIN
OrgNOCName:   Amazon AWS Network Operations
OrgNOCPhone:  +1-206-555-0000 
OrgNOCEmail:  amzn-noc-contact@amazon.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/AANO1-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName:   Amazon EC2 Abuse
OrgAbusePhone:  +1-206-555-0000 
OrgAbuseEmail:  trustandsafety@support.aws.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AEA8-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.219.164.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.219.164.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030503 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 11:00:19 CST 2026
;; MSG SIZE  rcvd: 106
Host info
141.164.219.3.in-addr.arpa domain name pointer ec2-3-219-164-141.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.164.219.3.in-addr.arpa	name = ec2-3-219-164-141.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
208.113.164.202 attackspam
<6 unauthorized SSH connections
2020-09-16 15:58:45
200.73.131.100 attackspambots
$f2bV_matches
2020-09-16 15:40:46
210.55.3.250 attack
Sep 16 04:03:00 pve1 sshd[16730]: Failed password for root from 210.55.3.250 port 56526 ssh2
...
2020-09-16 15:35:25
42.159.80.91 attackspam
Invalid user keywan from 42.159.80.91 port 1344
2020-09-16 15:59:20
74.120.14.78 attack
Port probing on unauthorized port 8812
2020-09-16 16:02:02
222.240.223.85 attackbots
2020-09-16T04:16:35.938515ollin.zadara.org sshd[364597]: Invalid user svn from 222.240.223.85 port 38196
2020-09-16T04:16:38.491000ollin.zadara.org sshd[364597]: Failed password for invalid user svn from 222.240.223.85 port 38196 ssh2
...
2020-09-16 15:56:28
139.198.17.31 attackbots
Brute%20Force%20SSH
2020-09-16 15:54:59
159.89.49.183 attack
Sep 16 09:27:55 inter-technics sshd[13384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.49.183  user=root
Sep 16 09:27:58 inter-technics sshd[13384]: Failed password for root from 159.89.49.183 port 55870 ssh2
Sep 16 09:32:02 inter-technics sshd[13655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.49.183  user=root
Sep 16 09:32:04 inter-technics sshd[13655]: Failed password for root from 159.89.49.183 port 40192 ssh2
Sep 16 09:36:18 inter-technics sshd[13899]: Invalid user admin from 159.89.49.183 port 52758
...
2020-09-16 15:45:28
182.176.132.99 attackspambots
Unauthorized connection attempt from IP address 182.176.132.99 on Port 445(SMB)
2020-09-16 16:06:10
121.46.26.126 attackbotsspam
2020-09-16T07:31:12.513234ionos.janbro.de sshd[105395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.26.126  user=root
2020-09-16T07:31:14.414756ionos.janbro.de sshd[105395]: Failed password for root from 121.46.26.126 port 35884 ssh2
2020-09-16T07:35:20.202357ionos.janbro.de sshd[105412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.26.126  user=root
2020-09-16T07:35:22.475605ionos.janbro.de sshd[105412]: Failed password for root from 121.46.26.126 port 55532 ssh2
2020-09-16T07:39:33.181415ionos.janbro.de sshd[105420]: Invalid user guest from 121.46.26.126 port 16774
2020-09-16T07:39:33.309581ionos.janbro.de sshd[105420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.26.126
2020-09-16T07:39:33.181415ionos.janbro.de sshd[105420]: Invalid user guest from 121.46.26.126 port 16774
2020-09-16T07:39:34.981666ionos.janbro.de sshd[105420]: Failed
...
2020-09-16 15:50:59
104.248.160.58 attackbotsspam
Sep 16 09:05:49 santamaria sshd\[27804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.160.58  user=root
Sep 16 09:05:51 santamaria sshd\[27804\]: Failed password for root from 104.248.160.58 port 46036 ssh2
Sep 16 09:09:22 santamaria sshd\[27872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.160.58  user=root
Sep 16 09:09:25 santamaria sshd\[27872\]: Failed password for root from 104.248.160.58 port 56864 ssh2
...
2020-09-16 15:30:47
98.146.212.146 attackbotsspam
$f2bV_matches
2020-09-16 15:32:14
1.194.238.187 attack
Invalid user slcinc from 1.194.238.187 port 34773
2020-09-16 15:43:16
206.189.38.105 attackbotsspam
Sep 15 20:01:58 dignus sshd[25851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.38.105  user=root
Sep 15 20:02:00 dignus sshd[25851]: Failed password for root from 206.189.38.105 port 48344 ssh2
Sep 15 20:06:55 dignus sshd[26280]: Invalid user R00T from 206.189.38.105 port 60534
Sep 15 20:06:55 dignus sshd[26280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.38.105
Sep 15 20:06:58 dignus sshd[26280]: Failed password for invalid user R00T from 206.189.38.105 port 60534 ssh2
...
2020-09-16 15:37:56
115.97.67.121 attackspambots
Telnetd brute force attack detected by fail2ban
2020-09-16 15:29:15

Recently Reported IPs

2606:4700:10::ac43:2424 50.16.164.120 122.193.247.98 122.192.203.127
2606:4700:10::6814:6394 121.8.28.57 121.230.89.106 2606:4700:10::6816:386d
121.234.219.187 14.207.194.113 148.135.51.49 148.135.51.34
2606:4700:10::6814:8221 2606:4700:10::6816:1391 2606:4700:10::6814:6018 122.193.247.65
155.193.255.147 10.97.191.254 80.241.215.26 185.241.208.155