Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.219.222.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2591
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.219.222.82.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 11:26:05 CST 2022
;; MSG SIZE  rcvd: 106
Host info
82.222.219.34.in-addr.arpa domain name pointer ec2-34-219-222-82.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.222.219.34.in-addr.arpa	name = ec2-34-219-222-82.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.21.200.230 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 09:16:38
37.49.225.249 attack
Brute force attack stopped by firewall
2019-07-05 09:34:53
37.49.225.77 attackspambots
Brute force attack stopped by firewall
2019-07-05 09:28:29
81.22.100.7 attackspambots
firewall-block_invalid_GET_Request
2019-07-05 09:04:24
111.230.8.40 attackbotsspam
Jul  5 01:15:17 dedicated sshd[19393]: Invalid user dev from 111.230.8.40 port 57076
2019-07-05 09:36:17
71.6.199.23 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-07-05 09:24:30
14.207.31.183 attackbots
Automatic report - SSH Brute-Force Attack
2019-07-05 09:07:24
60.27.243.63 attackbotsspam
6 failed attempt(s) in the last 24h
2019-07-05 09:15:47
37.49.230.29 attack
Brute force attack stopped by firewall
2019-07-05 09:38:16
77.82.90.20 attack
Sending SPAM email
2019-07-05 09:47:11
73.207.174.157 attackbotsspam
Jul  5 00:55:04 dev sshd\[21985\]: Invalid user fax from 73.207.174.157 port 60190
Jul  5 00:55:04 dev sshd\[21985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.207.174.157
...
2019-07-05 09:13:26
112.163.200.203 attackspam
WordPress wp-login brute force :: 112.163.200.203 0.136 BYPASS [05/Jul/2019:11:20:22  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-05 09:44:39
70.49.100.121 attack
ssh failed login
2019-07-05 09:09:21
116.92.233.140 attackbots
Port scan: Attack repeated for 24 hours
2019-07-05 09:43:52
80.82.77.227 attackbots
Brute force attack stopped by firewall
2019-07-05 09:26:06

Recently Reported IPs

34.228.20.57 34.228.240.80 34.68.199.137 34.245.85.129
34.68.200.229 34.71.91.71 34.75.76.219 34.73.169.166
34.91.68.96 34.238.53.44 34.77.99.252 35.154.70.13
35.180.139.24 34.90.134.170 35.173.244.8 35.173.47.236
35.167.21.43 35.180.139.94 35.197.52.142 35.180.181.94