Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.212.159.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28790
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.212.159.215.			IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021601 1800 900 604800 86400

;; Query time: 164 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 17 06:31:24 CST 2020
;; MSG SIZE  rcvd: 118
Host info
215.159.212.34.in-addr.arpa domain name pointer ec2-34-212-159-215.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.159.212.34.in-addr.arpa	name = ec2-34-212-159-215.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.249.123.38 attackbots
Nov 21 15:48:57 MK-Soft-VM3 sshd[15141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.123.38 
Nov 21 15:48:59 MK-Soft-VM3 sshd[15141]: Failed password for invalid user dbus from 58.249.123.38 port 47284 ssh2
...
2019-11-22 04:53:18
115.28.210.2 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 04:55:54
104.41.41.14 attackspambots
Automatic report - Banned IP Access
2019-11-22 05:01:22
111.177.32.83 attackbots
Nov 21 17:51:40 sso sshd[32265]: Failed password for root from 111.177.32.83 port 51324 ssh2
...
2019-11-22 05:01:06
113.197.36.67 attack
port scan and connect, tcp 22 (ssh)
2019-11-22 05:12:16
31.147.204.65 attackspam
Nov 22 01:00:27 itv-usvr-01 sshd[4559]: Invalid user molani from 31.147.204.65
Nov 22 01:00:27 itv-usvr-01 sshd[4559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.147.204.65
Nov 22 01:00:27 itv-usvr-01 sshd[4559]: Invalid user molani from 31.147.204.65
Nov 22 01:00:29 itv-usvr-01 sshd[4559]: Failed password for invalid user molani from 31.147.204.65 port 45935 ssh2
Nov 22 01:09:52 itv-usvr-01 sshd[5021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.147.204.65  user=root
Nov 22 01:09:54 itv-usvr-01 sshd[5021]: Failed password for root from 31.147.204.65 port 51382 ssh2
2019-11-22 04:35:01
186.28.241.139 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-22 05:10:42
167.172.85.135 attackspambots
SSH Brute Force, server-1 sshd[4439]: Failed password for root from 167.172.85.135 port 49062 ssh2
2019-11-22 04:50:10
106.12.5.148 attackspambots
Invalid user backup from 106.12.5.148 port 35062
2019-11-22 04:56:23
181.174.125.86 attackspam
Nov 21 07:36:37 web1 sshd\[29131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.174.125.86  user=uucp
Nov 21 07:36:39 web1 sshd\[29131\]: Failed password for uucp from 181.174.125.86 port 40320 ssh2
Nov 21 07:40:36 web1 sshd\[29506\]: Invalid user koraljka from 181.174.125.86
Nov 21 07:40:36 web1 sshd\[29506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.174.125.86
Nov 21 07:40:39 web1 sshd\[29506\]: Failed password for invalid user koraljka from 181.174.125.86 port 47750 ssh2
2019-11-22 04:43:46
106.12.13.143 attack
2019-11-21T21:15:39.772644centos sshd\[4056\]: Invalid user gallardes from 106.12.13.143 port 41108
2019-11-21T21:15:39.777552centos sshd\[4056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.143
2019-11-21T21:15:41.518615centos sshd\[4056\]: Failed password for invalid user gallardes from 106.12.13.143 port 41108 ssh2
2019-11-22 04:54:48
51.79.52.41 attackbotsspam
Invalid user crude from 51.79.52.41 port 49724
2019-11-22 05:00:44
200.123.158.145 attackspambots
Nov 21 08:00:27 hpm sshd\[18168\]: Invalid user nonah from 200.123.158.145
Nov 21 08:00:27 hpm sshd\[18168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.123.158.145
Nov 21 08:00:30 hpm sshd\[18168\]: Failed password for invalid user nonah from 200.123.158.145 port 47347 ssh2
Nov 21 08:05:10 hpm sshd\[18552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.123.158.145  user=root
Nov 21 08:05:12 hpm sshd\[18552\]: Failed password for root from 200.123.158.145 port 40841 ssh2
2019-11-22 05:04:01
5.53.124.155 attackbots
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.53.124.155
2019-11-22 05:02:52
115.186.136.24 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 05:08:29

Recently Reported IPs

13.192.241.228 67.151.172.148 58.19.1.42 140.106.111.117
96.235.125.161 10.3.23.151 119.217.105.136 39.79.20.28
44.156.203.249 188.99.137.169 36.217.142.41 86.34.224.162
208.178.67.253 197.115.55.216 174.219.1.6 141.211.248.207
220.210.173.76 200.56.45.49 36.39.181.246 60.218.100.17