Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '5.34.216.0 - 5.34.219.255'

% Abuse contact for '5.34.216.0 - 5.34.219.255' is 'abuse+ripe@akari.hk'

inetnum:        5.34.216.0 - 5.34.219.255
netname:        AKARI-US-LAX1-02
descr:          Akari Networks (Los Angeles)
org:            ORG-ANL45-RIPE
geofeed:        https://akari.hk/geofeed/
country:        US
admin-c:        ANA96-RIPE
tech-c:         ANA96-RIPE
abuse-c:        AR69994-RIPE
status:         SUB-ALLOCATED PA
mnt-by:         MAINT-AKARI-HK
created:        2024-02-27T08:28:31Z
last-modified:  2025-07-10T15:46:26Z
source:         RIPE

organisation:   ORG-ANL45-RIPE
org-name:       Akari Networks Limited
country:        HK
org-type:       LIR
address:        Rm. 1801 Easey Comm Bldg 253-261 Hennessy Road
address:        HK
address:        Wanchai
address:        HONG KONG
phone:          +852 9518 4590
admin-c:        ANA96-RIPE
tech-c:         ANA96-RIPE
abuse-c:        AR69994-RIPE
mnt-ref:        MAINT-AKARI-HK
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MAINT-AKARI-HK
created:        2023-03-09T10:09:02Z
last-modified:  2025-07-26T09:30:03Z
source:         RIPE # Filtered

role:           Akari Networks Administrator
address:        HONG KONG
address:        Wanchai
address:        HK
address:        Rm. 1801 Easey Comm Bldg 253-261 Hennessy Road
phone:          +852 95184590
nic-hdl:        ANA96-RIPE
mnt-by:         MAINT-AKARI-HK
created:        2023-03-09T10:09:00Z
last-modified:  2025-07-10T12:38:37Z
source:         RIPE # Filtered

% Information related to '5.34.218.0/24AS38136'

route:          5.34.218.0/24
origin:         AS38136
mnt-by:         MAINT-AKARI-HK
created:        2024-02-27T08:52:16Z
last-modified:  2024-02-27T08:52:16Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.34.218.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.34.218.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 18:46:11 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 201.218.34.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.218.34.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.88.108.230 attack
SSH bruteforce (Triggered fail2ban)
2020-04-06 07:44:32
134.209.109.246 attackbots
Fail2Ban Ban Triggered (2)
2020-04-06 07:49:47
45.143.223.11 attackspam
Attempts against SMTP/SSMTP
2020-04-06 07:45:47
106.12.140.168 attackspambots
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-06 07:30:38
94.208.86.146 attack
Chat Spam
2020-04-06 07:51:42
222.186.175.215 attackspambots
Apr  6 01:15:42 nextcloud sshd\[26550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Apr  6 01:15:44 nextcloud sshd\[26550\]: Failed password for root from 222.186.175.215 port 60622 ssh2
Apr  6 01:15:57 nextcloud sshd\[26550\]: Failed password for root from 222.186.175.215 port 60622 ssh2
2020-04-06 07:20:30
41.35.204.23 attackbotsspam
DATE:2020-04-05 23:37:52, IP:41.35.204.23, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-04-06 07:35:55
187.155.200.84 attack
Apr  6 00:03:09 localhost sshd\[32443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.155.200.84  user=root
Apr  6 00:03:11 localhost sshd\[32443\]: Failed password for root from 187.155.200.84 port 37874 ssh2
Apr  6 00:05:42 localhost sshd\[32660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.155.200.84  user=root
Apr  6 00:05:44 localhost sshd\[32660\]: Failed password for root from 187.155.200.84 port 53630 ssh2
Apr  6 00:08:20 localhost sshd\[32741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.155.200.84  user=root
...
2020-04-06 07:37:42
94.28.101.166 attackspambots
$f2bV_matches
2020-04-06 07:41:09
218.92.0.178 attackspambots
2020-04-05T22:49:43.827236abusebot-2.cloudsearch.cf sshd[27510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
2020-04-05T22:49:45.541974abusebot-2.cloudsearch.cf sshd[27510]: Failed password for root from 218.92.0.178 port 33502 ssh2
2020-04-05T22:49:48.891334abusebot-2.cloudsearch.cf sshd[27510]: Failed password for root from 218.92.0.178 port 33502 ssh2
2020-04-05T22:49:43.827236abusebot-2.cloudsearch.cf sshd[27510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
2020-04-05T22:49:45.541974abusebot-2.cloudsearch.cf sshd[27510]: Failed password for root from 218.92.0.178 port 33502 ssh2
2020-04-05T22:49:48.891334abusebot-2.cloudsearch.cf sshd[27510]: Failed password for root from 218.92.0.178 port 33502 ssh2
2020-04-05T22:49:43.827236abusebot-2.cloudsearch.cf sshd[27510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2020-04-06 07:20:53
111.229.143.161 attack
Apr  5 22:45:30 ws26vmsma01 sshd[106128]: Failed password for root from 111.229.143.161 port 50566 ssh2
...
2020-04-06 07:32:22
14.29.145.11 attackspam
$f2bV_matches
2020-04-06 07:25:21
222.186.180.9 attackbotsspam
Apr  6 07:33:47 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9
Apr  6 07:33:38 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9
Apr  6 07:33:41 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9
Apr  6 07:33:44 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9
Apr  6 07:33:47 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9
Apr  6 07:33:47 bacztwo sshd[27012]: Failed keyboard-interactive/pam for root from 222.186.180.9 port 60538 ssh2
Apr  6 07:33:38 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9
Apr  6 07:33:41 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9
Apr  6 07:33:44 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 222.186.180.9
Apr  6 07:33:47 bacztwo sshd[27012]: error: PAM: Authentication failure for root from 2
...
2020-04-06 07:39:59
201.140.123.130 attackbotsspam
Apr  6 01:35:57 minden010 sshd[7891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.140.123.130
Apr  6 01:35:59 minden010 sshd[7891]: Failed password for invalid user user from 201.140.123.130 port 50896 ssh2
Apr  6 01:37:51 minden010 sshd[8185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.140.123.130
...
2020-04-06 07:40:26
112.90.197.66 attackbots
Apr  5 23:38:04 debian-2gb-nbg1-2 kernel: \[8381713.381705\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=112.90.197.66 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=1035 PROTO=TCP SPT=59857 DPT=6380 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-06 07:23:27

Recently Reported IPs

103.116.46.4 105.247.83.229 8.163.63.8 66.132.172.213
180.153.236.60 180.153.236.212 180.153.236.201 2606:4700:10::6816:2300
134.35.157.130 2606:4700:10::6814:6009 178.200.217.26 209.38.101.158
255.96.99.39 2606:4700:10::6816:3929 2606:4700:10::6814:7821 2606:4700:10::6816:1312
2606:4700:10::ac43:2087 2606:4700:10::6816:1355 134.35.157.157 2606:4700:10::6814:9311