Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.196.219.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33970
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.196.219.147.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 26 18:37:52 +08 2019
;; MSG SIZE  rcvd: 118

Host info
147.219.196.34.in-addr.arpa domain name pointer ec2-34-196-219-147.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
147.219.196.34.in-addr.arpa	name = ec2-34-196-219-147.compute-1.amazonaws.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
139.99.157.106 attackbotsspam
Automatic report - Banned IP Access
2019-10-11 07:05:01
91.108.156.30 attackspam
Automatic report - Port Scan Attack
2019-10-11 07:12:58
192.42.116.25 attack
2019-10-10T20:06:30.937526abusebot.cloudsearch.cf sshd\[26248\]: Invalid user utilisateur from 192.42.116.25 port 47462
2019-10-11 07:08:29
112.169.152.105 attack
Oct 11 05:59:43 webhost01 sshd[1251]: Failed password for root from 112.169.152.105 port 59144 ssh2
...
2019-10-11 07:32:41
103.5.150.16 attackspam
WordPress wp-login brute force :: 103.5.150.16 0.048 BYPASS [11/Oct/2019:07:06:38  1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-11 07:06:07
177.96.10.150 attackbotsspam
Oct 10 15:57:46 PiServer sshd[28732]: Failed password for r.r from 177.96.10.150 port 36184 ssh2
Oct 10 16:06:09 PiServer sshd[29102]: Failed password for r.r from 177.96.10.150 port 11432 ssh2
Oct 10 16:14:10 PiServer sshd[29413]: Failed password for r.r from 177.96.10.150 port 2037 ssh2
Oct 10 16:22:03 PiServer sshd[29651]: Failed password for r.r from 177.96.10.150 port 21513 ssh2
Oct 10 16:29:56 PiServer sshd[29869]: Failed password for r.r from 177.96.10.150 port 20228 ssh2
Oct 10 16:37:41 PiServer sshd[30064]: Invalid user 123 from 177.96.10.150
Oct 10 16:37:42 PiServer sshd[30064]: Failed password for invalid user 123 from 177.96.10.150 port 60966 ssh2
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct 10 17:23:19 PiServer sshd[31509]: Invalid user 5tgb6yhn7ujm from 177.96.10.150
Oct 10 17:23:21 PiServer sshd[31509]: Failed password for invalid user 5tgb6yhn7ujm from 177.96.10.150 port 61082 ssh2
Oct 10 17:30:40 PiServer sshd[31761]: Invalid user 7ygv6tfc from 177.96.10.150
Oct ........
------------------------------
2019-10-11 07:25:32
200.131.242.2 attackbotsspam
Oct 10 12:54:31 wbs sshd\[29529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2  user=root
Oct 10 12:54:33 wbs sshd\[29529\]: Failed password for root from 200.131.242.2 port 11705 ssh2
Oct 10 12:59:09 wbs sshd\[29931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2  user=root
Oct 10 12:59:11 wbs sshd\[29931\]: Failed password for root from 200.131.242.2 port 22641 ssh2
Oct 10 13:03:40 wbs sshd\[30337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2  user=root
2019-10-11 07:12:27
72.55.193.138 attack
Oct 10 22:06:02 mail sshd\[16992\]: Invalid user admin from 72.55.193.138
Oct 10 22:06:02 mail sshd\[16992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.55.193.138
Oct 10 22:06:04 mail sshd\[16992\]: Failed password for invalid user admin from 72.55.193.138 port 59556 ssh2
...
2019-10-11 07:21:51
94.102.51.98 attackspambots
Port scan on 3 port(s): 3342 3368 4489
2019-10-11 07:38:44
217.182.172.204 attack
Oct 11 01:28:36 SilenceServices sshd[1109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.172.204
Oct 11 01:28:38 SilenceServices sshd[1109]: Failed password for invalid user Testing111 from 217.182.172.204 port 56406 ssh2
Oct 11 01:32:19 SilenceServices sshd[3460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.172.204
2019-10-11 07:35:45
180.76.186.233 attackspam
Oct 10 23:22:08 www sshd\[87871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.186.233  user=root
Oct 10 23:22:10 www sshd\[87871\]: Failed password for root from 180.76.186.233 port 56228 ssh2
Oct 10 23:26:02 www sshd\[87904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.186.233  user=root
...
2019-10-11 07:02:48
201.47.158.130 attackbots
Oct 11 00:53:51 cvbnet sshd[29523]: Failed password for root from 201.47.158.130 port 35866 ssh2
...
2019-10-11 07:42:39
104.139.5.180 attackspambots
Oct 10 13:19:31 tdfoods sshd\[9676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-104-139-5-180.carolina.res.rr.com  user=root
Oct 10 13:19:33 tdfoods sshd\[9676\]: Failed password for root from 104.139.5.180 port 41056 ssh2
Oct 10 13:23:54 tdfoods sshd\[10060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-104-139-5-180.carolina.res.rr.com  user=root
Oct 10 13:23:56 tdfoods sshd\[10060\]: Failed password for root from 104.139.5.180 port 52760 ssh2
Oct 10 13:28:26 tdfoods sshd\[10414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-104-139-5-180.carolina.res.rr.com  user=root
2019-10-11 07:33:48
103.27.61.222 attackbotsspam
fail2ban honeypot
2019-10-11 07:15:30
222.222.156.146 attackspambots
Honeypot hit.
2019-10-11 07:37:53

Recently Reported IPs

201.59.187.162 106.193.247.120 70.194.102.119 114.215.154.125
168.30.73.52 52.44.176.164 140.178.246.100 128.199.36.93
117.241.195.245 184.173.109.175 2605:e000:2ec7:9400:3cb3:f461:ad9a:32b1 138.203.207.31
5.181.164.133 200.44.208.233 61.246.29.146 88.249.200.21
60.174.55.80 58.243.104.238 92.146.142.140 80.210.79.109