Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.212.214.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.212.214.49.			IN	A

;; AUTHORITY SECTION:
.			193	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060100 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 01 20:53:57 CST 2024
;; MSG SIZE  rcvd: 106
Host info
49.214.212.34.in-addr.arpa domain name pointer ec2-34-212-214-49.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.214.212.34.in-addr.arpa	name = ec2-34-212-214-49.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.175.145.122 attack
Automatic report - XMLRPC Attack
2020-02-23 06:31:10
110.249.223.39 attack
Invalid user stu from 110.249.223.39 port 39669
2020-02-23 06:58:20
146.185.130.101 attackbotsspam
Invalid user couchdb from 146.185.130.101 port 55046
2020-02-23 07:00:22
143.137.191.41 attackspambots
Automatic report - XMLRPC Attack
2020-02-23 06:27:24
123.212.255.193 attackspambots
Feb 22 17:39:58 haigwepa sshd[31005]: Failed password for root from 123.212.255.193 port 44070 ssh2
...
2020-02-23 06:33:14
114.67.64.75 attackspam
SMB Server BruteForce Attack
2020-02-23 07:04:12
72.55.186.11 attackbotsspam
Unauthorized access to WordPress php files
2020-02-23 06:32:32
198.108.67.56 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 9101 proto: TCP cat: Misc Attack
2020-02-23 06:44:20
173.236.168.101 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-02-23 06:48:00
193.31.24.113 attack
02/22/2020-23:19:46.779398 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-23 06:26:40
64.188.3.214 attack
Fail2Ban Ban Triggered
2020-02-23 06:50:49
18.163.163.75 attack
Automatic report - XMLRPC Attack
2020-02-23 06:54:11
46.221.46.250 attack
Unauthorized connection attempt detected from IP address 46.221.46.250 to port 445
2020-02-23 06:54:35
209.250.255.222 attackbots
suspicious action Sat, 22 Feb 2020 13:43:48 -0300
2020-02-23 06:57:53
134.90.149.147 attackbots
(From afonsosreis@msn.com) UРDАTE: Crуptoсurrenсy Investing Strategу - Q2 2020. Rеcеivе рassive incomе of $ 70,000 рer month: https://links.wtf/oAhi
2020-02-23 06:27:43

Recently Reported IPs

38.132.85.97 149.253.206.73 208.34.113.126 27.33.58.171
88.153.62.191 233.84.104.129 252.156.194.217 171.124.29.230
124.211.64.177 86.49.151.162 56.132.177.29 25.41.11.238
147.221.10.9 188.18.42.56 65.180.68.86 89.8.77.23
32.220.96.192 243.153.90.52 187.150.87.6 209.101.211.145