Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.145.4.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28032
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.145.4.221.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051500 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 21:25:34 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 221.4.145.34.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.4.145.34.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.114.105.33 attackspam
May 30 22:07:00 gw1 sshd[21495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.114.105.33
May 30 22:07:01 gw1 sshd[21495]: Failed password for invalid user rainier from 40.114.105.33 port 40868 ssh2
...
2020-05-31 01:07:18
104.248.160.58 attackbotsspam
May 30 16:09:13 MainVPS sshd[29666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.160.58  user=root
May 30 16:09:15 MainVPS sshd[29666]: Failed password for root from 104.248.160.58 port 58980 ssh2
May 30 16:12:59 MainVPS sshd[302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.160.58  user=root
May 30 16:13:01 MainVPS sshd[302]: Failed password for root from 104.248.160.58 port 36254 ssh2
May 30 16:16:45 MainVPS sshd[3469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.160.58  user=root
May 30 16:16:46 MainVPS sshd[3469]: Failed password for root from 104.248.160.58 port 42058 ssh2
...
2020-05-31 01:18:48
184.105.247.214 attackspambots
firewall-block, port(s): 3389/tcp
2020-05-31 00:46:13
193.112.98.79 attackbots
May 30 16:26:09 hosting sshd[27183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.98.79  user=admin
May 30 16:26:11 hosting sshd[27183]: Failed password for admin from 193.112.98.79 port 31941 ssh2
...
2020-05-31 01:21:46
114.119.163.184 attack
Automatic report - Banned IP Access
2020-05-31 01:18:27
95.91.33.17 attackspambots
20 attempts against mh-misbehave-ban on comet
2020-05-31 01:11:07
162.0.228.113 attack
Failed password for invalid user susan from 162.0.228.113 port 55800 ssh2
2020-05-31 00:58:00
128.199.185.42 attackspambots
5x Failed Password
2020-05-31 01:08:14
157.230.133.15 attackbots
firewall-block, port(s): 28520/tcp
2020-05-31 00:48:52
222.186.175.202 attackbotsspam
2020-05-30T16:52:23.290106server.espacesoutien.com sshd[24456]: Failed password for root from 222.186.175.202 port 16880 ssh2
2020-05-30T16:52:26.272551server.espacesoutien.com sshd[24456]: Failed password for root from 222.186.175.202 port 16880 ssh2
2020-05-30T16:52:29.666805server.espacesoutien.com sshd[24456]: Failed password for root from 222.186.175.202 port 16880 ssh2
2020-05-30T16:52:32.877625server.espacesoutien.com sshd[24456]: Failed password for root from 222.186.175.202 port 16880 ssh2
...
2020-05-31 00:54:00
138.197.66.68 attack
*Port Scan* detected from 138.197.66.68 (US/United States/New Jersey/Clifton/-). 4 hits in the last 200 seconds
2020-05-31 01:04:28
18.140.71.152 attackspambots
(sshd) Failed SSH login from 18.140.71.152 (SG/Singapore/ec2-18-140-71-152.ap-southeast-1.compute.amazonaws.com): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 30 14:13:13 andromeda sshd[16241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.140.71.152  user=root
May 30 14:13:15 andromeda sshd[16241]: Failed password for root from 18.140.71.152 port 49134 ssh2
May 30 14:25:21 andromeda sshd[17442]: Invalid user adsl from 18.140.71.152 port 56208
2020-05-31 00:47:54
37.223.180.43 attack
Invalid user toor from 37.223.180.43 port 59050
2020-05-31 01:07:44
162.243.42.225 attackbots
May 30 14:04:38 ovpn sshd\[10976\]: Invalid user classroom from 162.243.42.225
May 30 14:04:38 ovpn sshd\[10976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225
May 30 14:04:39 ovpn sshd\[10976\]: Failed password for invalid user classroom from 162.243.42.225 port 54528 ssh2
May 30 14:09:53 ovpn sshd\[12263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225  user=root
May 30 14:09:56 ovpn sshd\[12263\]: Failed password for root from 162.243.42.225 port 33148 ssh2
2020-05-31 00:59:14
209.250.128.16 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-05-31 01:21:29

Recently Reported IPs

185.90.22.109 123.57.138.150 119.233.73.26 52.41.154.213
118.239.44.111 97.239.84.20 194.177.177.229 173.44.67.225
128.161.239.230 163.28.153.17 162.217.119.122 118.210.251.115
11.89.147.30 18.114.207.213 58.212.186.9 218.45.37.11
45.105.150.159 18.206.97.48 64.55.240.228 59.91.109.176