Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.86.80.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22778
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.86.80.12.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 23:59:21 CST 2022
;; MSG SIZE  rcvd: 104
Host info
12.80.86.34.in-addr.arpa domain name pointer 12.80.86.34.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.80.86.34.in-addr.arpa	name = 12.80.86.34.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
143.255.42.65 attackspam
Unauthorized connection attempt from IP address 143.255.42.65 on Port 445(SMB)
2020-07-11 03:27:47
187.214.238.135 attack
1594384262 - 07/10/2020 14:31:02 Host: 187.214.238.135/187.214.238.135 Port: 445 TCP Blocked
2020-07-11 03:30:35
139.99.40.44 attackbots
2020-07-10T20:30:50.423029centos sshd[5661]: Invalid user www from 139.99.40.44 port 44790
2020-07-10T20:30:53.065067centos sshd[5661]: Failed password for invalid user www from 139.99.40.44 port 44790 ssh2
2020-07-10T20:37:00.781853centos sshd[5997]: Invalid user fulton from 139.99.40.44 port 42392
...
2020-07-11 03:34:50
51.38.51.200 attack
Repeated brute force against a port
2020-07-11 03:15:58
34.217.77.221 attackbots
[MK-Root1] Blocked by UFW
2020-07-11 03:37:58
157.245.62.18 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-11 03:33:35
77.73.68.250 attackspambots
SSH auth scanning - multiple failed logins
2020-07-11 03:14:40
203.186.54.237 attack
Jul 10 19:12:22 django-0 sshd[6106]: Invalid user richter from 203.186.54.237
Jul 10 19:12:24 django-0 sshd[6106]: Failed password for invalid user richter from 203.186.54.237 port 46266 ssh2
Jul 10 19:15:21 django-0 sshd[6165]: Invalid user wzo from 203.186.54.237
...
2020-07-11 03:21:34
81.28.163.250 attack
Unauthorized connection attempt from IP address 81.28.163.250 on Port 445(SMB)
2020-07-11 03:35:03
110.43.50.229 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-07-11 03:23:02
185.220.102.8 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-11 03:16:24
189.217.123.56 attackspam
Unauthorized connection attempt from IP address 189.217.123.56 on Port 445(SMB)
2020-07-11 03:08:00
211.254.215.197 attack
Jul 10 21:23:46 sip sshd[21459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.215.197
Jul 10 21:23:47 sip sshd[21459]: Failed password for invalid user hisa from 211.254.215.197 port 50058 ssh2
Jul 10 21:41:28 sip sshd[27935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.215.197
2020-07-11 03:41:48
222.186.173.226 attack
detected by Fail2Ban
2020-07-11 03:37:07
190.144.104.50 attackbots
Unauthorized connection attempt from IP address 190.144.104.50 on Port 445(SMB)
2020-07-11 03:24:15

Recently Reported IPs

35.238.28.251 34.105.126.141 35.234.133.175 198.199.94.158
34.105.135.89 83.22.183.181 45.136.253.87 34.127.55.232
128.90.122.71 92.204.146.20 34.220.199.106 34.89.204.54
144.22.254.82 83.130.236.96 80.211.143.180 78.46.195.10
35.188.228.162 82.207.240.132 82.223.196.123 35.239.117.122