Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: Amazon Technologies Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.219.133.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.219.133.118.			IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112602 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 27 03:30:48 CST 2019
;; MSG SIZE  rcvd: 118
Host info
118.133.219.34.in-addr.arpa domain name pointer ec2-34-219-133-118.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.133.219.34.in-addr.arpa	name = ec2-34-219-133-118.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.145.53.134 attack
Apr 17 00:38:30 vps sshd\[24556\]: Invalid user admin from 218.145.53.134
Apr 17 01:31:21 vps sshd\[25584\]: Invalid user gpadmin from 218.145.53.134
...
2020-04-17 08:25:04
45.114.195.10 attack
Unauthorized connection attempt from IP address 45.114.195.10 on Port 445(SMB)
2020-04-17 08:11:46
82.99.204.30 attackspam
Unauthorized connection attempt from IP address 82.99.204.30 on Port 445(SMB)
2020-04-17 08:31:35
123.207.11.65 attackspambots
Apr 17 06:59:32 www4 sshd\[28716\]: Invalid user luke from 123.207.11.65
Apr 17 06:59:32 www4 sshd\[28716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.11.65
Apr 17 06:59:35 www4 sshd\[28716\]: Failed password for invalid user luke from 123.207.11.65 port 53566 ssh2
...
2020-04-17 12:01:29
35.188.62.96 attackspam
20 attempts against mh-ssh on creek
2020-04-17 08:08:50
45.125.65.35 attack
Apr 17 01:53:19 srv01 postfix/smtpd\[20225\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 17 01:54:35 srv01 postfix/smtpd\[24676\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 17 01:54:55 srv01 postfix/smtpd\[20225\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 17 01:55:03 srv01 postfix/smtpd\[20956\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 17 02:04:10 srv01 postfix/smtpd\[24671\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-17 08:11:05
95.213.177.122 attackbots
Port scan: Attack repeated for 24 hours
2020-04-17 08:06:23
98.147.122.206 attack
Automatic report - Port Scan Attack
2020-04-17 07:55:13
179.53.200.114 attackbots
Apr 17 01:31:29 ArkNodeAT sshd\[19153\]: Invalid user test from 179.53.200.114
Apr 17 01:31:29 ArkNodeAT sshd\[19153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.53.200.114
Apr 17 01:31:31 ArkNodeAT sshd\[19153\]: Failed password for invalid user test from 179.53.200.114 port 41106 ssh2
2020-04-17 08:10:06
81.169.248.234 attackbotsspam
Apr 16 23:31:27 *** sshd[7171]: User root from 81.169.248.234 not allowed because not listed in AllowUsers
2020-04-17 08:21:22
85.26.233.149 attackspambots
Unauthorized connection attempt from IP address 85.26.233.149 on Port 445(SMB)
2020-04-17 08:26:35
35.229.89.153 attackspam
Tried more than 140 times to hack my QNAP server by login with “admin” account
Solution: make sure to create another account with admin privileges and disable “admin”
2020-04-17 08:09:39
200.105.173.98 attackspambots
20/4/16@19:31:45: FAIL: Alarm-Network address from=200.105.173.98
20/4/16@19:31:45: FAIL: Alarm-Network address from=200.105.173.98
...
2020-04-17 07:56:11
106.12.168.88 attack
Apr 17 00:51:37 ns382633 sshd\[31132\]: Invalid user wx from 106.12.168.88 port 49290
Apr 17 00:51:37 ns382633 sshd\[31132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.168.88
Apr 17 00:51:39 ns382633 sshd\[31132\]: Failed password for invalid user wx from 106.12.168.88 port 49290 ssh2
Apr 17 01:31:35 ns382633 sshd\[6897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.168.88  user=root
Apr 17 01:31:37 ns382633 sshd\[6897\]: Failed password for root from 106.12.168.88 port 54462 ssh2
2020-04-17 08:03:30
62.210.125.29 attackbots
Apr 16 01:05:36 XXX sshd[64405]: Invalid user stack from 62.210.125.29 port 51996
2020-04-17 08:00:06

Recently Reported IPs

56.87.238.163 210.183.181.70 101.123.128.103 89.182.136.97
119.64.47.44 189.122.168.133 5.196.68.74 80.44.44.10
162.166.62.102 159.138.159.0 129.32.167.42 55.101.109.27
153.26.191.96 233.25.226.18 237.39.106.15 177.152.130.35
202.5.16.138 52.210.238.11 71.12.226.170 113.140.218.75