Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: Amazon Technologies Inc.

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
[LAN access from remote] from 34.208.139.143:27705 to 192.168.XX.XX:5000, Thursday, Oct 03,2019 05:32:22
[LAN access from remote] from 34.208.139.143:1598 to 192.168.XX.XX:5001, Thursday, Oct 03,2019 05:32:13
2019-10-05 01:32:44
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.208.139.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53022
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.208.139.143.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 08 03:30:34 +08 2019
;; MSG SIZE  rcvd: 118

Host info
143.139.208.34.in-addr.arpa domain name pointer orngw.cs.quickconnect.to.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
143.139.208.34.in-addr.arpa	name = orngw.cs.quickconnect.to.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
153.156.47.213 attackbotsspam
Unauthorized connection attempt detected from IP address 153.156.47.213 to port 81 [T]
2020-01-07 03:31:42
42.62.2.130 attackbotsspam
Unauthorized connection attempt detected from IP address 42.62.2.130 to port 1433 [T]
2020-01-07 03:19:34
42.118.210.184 attack
Unauthorized connection attempt detected from IP address 42.118.210.184 to port 23 [T]
2020-01-07 03:18:47
123.56.221.147 attackbotsspam
Unauthorized connection attempt detected from IP address 123.56.221.147 to port 22 [T]
2020-01-07 03:33:23
1.1.145.3 attackbots
Unauthorized connection attempt detected from IP address 1.1.145.3 to port 82 [T]
2020-01-07 02:55:42
36.105.171.161 attack
Unauthorized connection attempt detected from IP address 36.105.171.161 to port 23 [J]
2020-01-07 03:20:32
213.159.213.137 attack
Automated report (2020-01-06T13:12:29+00:00). Faked user agent detected.
2020-01-07 02:59:00
122.100.65.48 attackspambots
Unauthorized connection attempt detected from IP address 122.100.65.48 to port 4567 [J]
2020-01-07 03:33:56
1.54.14.219 attackbotsspam
Unauthorized connection attempt detected from IP address 1.54.14.219 to port 23 [J]
2020-01-07 03:22:31
222.185.27.18 attackbots
Unauthorized connection attempt detected from IP address 222.185.27.18 to port 1433 [T]
2020-01-07 03:23:04
51.75.46.195 attackbots
Spam Timestamp : 06-Jan-20 13:03   BlockList Provider  Mail Spike Worst Possible   (314)
2020-01-07 03:17:13
46.161.27.218 attackspam
Unauthorized connection attempt detected from IP address 46.161.27.218 to port 5900 [T]
2020-01-07 03:17:34
182.155.163.13 attack
Unauthorized connection attempt detected from IP address 182.155.163.13 to port 5555 [J]
2020-01-07 03:29:58
42.114.162.227 attackbotsspam
Unauthorized connection attempt detected from IP address 42.114.162.227 to port 445 [T]
2020-01-07 03:19:21
164.52.24.180 attackbotsspam
Unauthorized connection attempt detected from IP address 164.52.24.180 to port 11 [J]
2020-01-07 03:04:56

Recently Reported IPs

142.93.214.20 202.75.62.141 103.113.3.170 40.122.104.245
144.202.56.52 181.215.89.98 159.203.170.196 120.31.140.51
92.60.235.14 61.191.130.198 218.60.28.126 142.93.124.66
139.199.100.110 1.20.99.123 94.156.222.135 112.197.172.233
185.193.24.226 180.250.18.136 188.170.173.236 162.213.255.149