Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.209.69.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.209.69.99.			IN	A

;; AUTHORITY SECTION:
.			128	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123100 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 15:16:59 CST 2021
;; MSG SIZE  rcvd: 105
Host info
99.69.209.34.in-addr.arpa domain name pointer ec2-34-209-69-99.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.69.209.34.in-addr.arpa	name = ec2-34-209-69-99.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.42.5.20 attackbots
Unauthorized connection attempt detected from IP address 66.42.5.20 to port 23
2020-05-13 03:01:00
142.93.143.112 attack
Unauthorized connection attempt detected from IP address 142.93.143.112 to port 8278
2020-05-13 02:47:27
92.101.158.169 attackspambots
Unauthorized connection attempt detected from IP address 92.101.158.169 to port 445
2020-05-13 02:53:16
195.181.70.16 attack
Unauthorized connection attempt detected from IP address 195.181.70.16 to port 8080
2020-05-13 03:11:36
162.158.187.114 attackspambots
$f2bV_matches
2020-05-13 02:46:03
175.203.240.173 attack
Unauthorized connection attempt detected from IP address 175.203.240.173 to port 5555
2020-05-13 02:44:27
211.224.35.213 attackbots
88/tcp
[2020-05-12]1pkt
2020-05-13 02:32:43
185.173.35.17 attackbotsspam
5907/tcp 50070/tcp 3333/tcp...
[2020-03-12/05-12]65pkt,47pt.(tcp),4pt.(udp),1tp.(icmp)
2020-05-13 02:42:13
201.211.94.20 attackbots
Unauthorized connection attempt detected from IP address 201.211.94.20 to port 445
2020-05-13 03:07:42
221.156.222.42 attackbots
Unauthorized connection attempt detected from IP address 221.156.222.42 to port 23
2020-05-13 03:06:47
178.117.251.238 attackbots
Unauthorized connection attempt detected from IP address 178.117.251.238 to port 8089
2020-05-13 02:43:47
206.189.65.107 attackbotsspam
firewall-block, port(s): 10067/tcp
2020-05-13 02:33:45
94.141.152.250 attack
Unauthorized connection attempt detected from IP address 94.141.152.250 to port 8080
2020-05-13 02:52:16
131.221.191.248 attackbots
Unauthorized connection attempt detected from IP address 131.221.191.248 to port 81
2020-05-13 02:48:56
223.78.160.188 attack
May 12 19:49:52 debian-2gb-nbg1-2 kernel: \[11564653.954778\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=223.78.160.188 DST=195.201.40.59 LEN=40 TOS=0x04 PREC=0x00 TTL=49 ID=16161 PROTO=TCP SPT=43820 DPT=2323 WINDOW=47420 RES=0x00 SYN URGP=0
2020-05-13 03:06:28

Recently Reported IPs

254.61.107.74 243.62.144.230 78.176.138.80 80.72.151.206
241.23.147.171 41.246.31.48 71.199.190.222 206.91.195.12
11.90.24.169 30.138.252.119 95.72.145.78 70.63.244.119
250.137.163.191 127.55.66.182 1.116.37.251 208.25.132.248
140.224.192.175 140.76.32.199 91.101.31.137 130.129.61.140