Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.109.64.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.109.64.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 15:31:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 85.64.109.34.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 85.64.109.34.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.13.65.18 attack
SSH Brute Force
2020-04-29 12:52:54
106.13.49.233 attackspambots
SSH Brute Force
2020-04-29 12:54:57
111.231.225.162 attack
Apr 29 05:59:20  sshd\[3180\]: Invalid user liangyzh from 111.231.225.162Apr 29 05:59:22  sshd\[3180\]: Failed password for invalid user liangyzh from 111.231.225.162 port 34114 ssh2
...
2020-04-29 12:53:59
156.96.59.93 attackspambots
5 failed smtp login attempts in 3600s
2020-04-29 13:28:32
223.247.140.89 attackspam
2020-04-29T04:39:26.660889shield sshd\[9561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.140.89  user=root
2020-04-29T04:39:28.591354shield sshd\[9561\]: Failed password for root from 223.247.140.89 port 41316 ssh2
2020-04-29T04:42:40.922526shield sshd\[9997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.140.89  user=root
2020-04-29T04:42:43.153823shield sshd\[9997\]: Failed password for root from 223.247.140.89 port 52974 ssh2
2020-04-29T04:45:36.595751shield sshd\[10321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.140.89  user=root
2020-04-29 12:53:33
106.13.44.83 attack
SSH Brute Force
2020-04-29 12:55:29
106.13.3.214 attackbotsspam
SSH Brute Force
2020-04-29 12:59:12
106.12.183.6 attackbotsspam
SSH Brute Force
2020-04-29 13:14:49
106.13.101.129 attackbots
SSH Brute Force
2020-04-29 13:01:13
104.248.7.148 attack
SSH Brute Force
2020-04-29 13:27:37
104.45.11.126 attackspam
SSH Brute Force
2020-04-29 13:26:35
106.12.93.25 attack
SSH Brute Force
2020-04-29 13:03:02
106.13.81.242 attackbotsspam
SSH Brute Force
2020-04-29 12:52:12
106.12.211.247 attackbots
SSH Brute Force
2020-04-29 13:11:00
106.13.126.21 attack
SSH Brute Force
2020-04-29 13:00:57

Recently Reported IPs

74.216.242.123 143.187.245.138 96.111.52.99 93.90.158.72
136.158.208.40 185.109.215.159 13.24.96.185 241.94.63.111
255.50.14.194 181.54.249.156 200.52.249.242 118.231.105.178
221.239.59.60 229.91.143.34 74.128.160.7 82.247.30.10
28.193.50.6 6.145.231.104 40.154.201.162 164.32.139.152