Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.14.230.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.14.230.218.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060601 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 07 11:14:24 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 218.230.14.34.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 218.230.14.34.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
49.83.169.24 attack
20 attempts against mh-ssh on star
2020-09-06 06:22:30
152.32.202.198 attackspambots
Sep  5 13:35:20 ny01 sshd[17828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.202.198
Sep  5 13:35:22 ny01 sshd[17828]: Failed password for invalid user teamspeak from 152.32.202.198 port 41330 ssh2
Sep  5 13:38:11 ny01 sshd[18159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.202.198
2020-09-06 06:37:13
45.82.136.246 attackspambots
Sep  5 23:58:41 sd-69548 sshd[851729]: Unable to negotiate with 45.82.136.246 port 47826: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Sep  5 23:58:53 sd-69548 sshd[851746]: Unable to negotiate with 45.82.136.246 port 57016: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-09-06 06:17:24
213.180.203.49 attackspam
Mailserver and mailaccount attacks
2020-09-06 06:45:30
112.202.3.55 attackspambots
1599324634 - 09/05/2020 18:50:34 Host: 112.202.3.55/112.202.3.55 Port: 445 TCP Blocked
2020-09-06 06:18:47
193.27.229.224 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 50243 proto: tcp cat: Misc Attackbytes: 60
2020-09-06 06:27:30
45.148.10.28 attackbots
 TCP (SYN) 45.148.10.28:39138 -> port 80, len 44
2020-09-06 06:40:47
104.244.76.245 attackbotsspam
Helo
2020-09-06 06:48:30
64.227.0.131 attackbotsspam
Sep  6 00:27:37 tor-proxy-02 sshd\[28827\]: User root from 64.227.0.131 not allowed because not listed in AllowUsers
Sep  6 00:27:48 tor-proxy-02 sshd\[28829\]: Invalid user oracle from 64.227.0.131 port 45424
Sep  6 00:27:58 tor-proxy-02 sshd\[28831\]: User root from 64.227.0.131 not allowed because not listed in AllowUsers
...
2020-09-06 06:40:20
118.67.215.141 attackspambots
Sep  5 18:46:04 abendstille sshd\[16138\]: Invalid user jcq from 118.67.215.141
Sep  5 18:46:04 abendstille sshd\[16138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.67.215.141
Sep  5 18:46:06 abendstille sshd\[16138\]: Failed password for invalid user jcq from 118.67.215.141 port 49200 ssh2
Sep  5 18:50:41 abendstille sshd\[20269\]: Invalid user magento_user from 118.67.215.141
Sep  5 18:50:41 abendstille sshd\[20269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.67.215.141
...
2020-09-06 06:16:14
51.91.132.52 attackbots
failed attempts to inject php and access /.env
2020-09-06 06:23:28
31.217.5.13 attackspambots
31.217.5.13 - - [05/Sep/2020:16:57:42 +0000] "GET /wp-login.php HTTP/1.1" 301 599 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
...
2020-09-06 06:33:54
193.169.253.136 attack
2020-09-06 01:02:39 auth_plain authenticator failed for (VRAfu28HW) [193.169.253.136]: 535 Incorrect authentication data (set_id=support)
2020-09-06 01:02:39 auth_plain authenticator failed for (wg2kutFR) [193.169.253.136]: 535 Incorrect authentication data (set_id=support)
...
2020-09-06 06:46:23
185.220.101.9 attackspambots
$lgm
2020-09-06 06:30:31
192.3.204.194 attack
scanning for potential vulnerable apps (wordpress etc.) and database accesses. Requested URI: /wp/wp-admin/
2020-09-06 06:31:41

Recently Reported IPs

17.121.46.84 119.108.240.20 29.124.159.172 38.44.49.89
222.61.13.78 35.134.235.85 150.40.71.7 25.165.223.104
63.80.9.92 196.159.177.60 227.146.128.170 154.50.229.187
64.199.88.127 34.13.70.207 156.115.239.77 236.63.145.227
179.198.6.157 25.4.222.165 96.173.18.227 69.49.9.100