Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.34.214.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;71.34.214.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:42:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
113.214.34.71.in-addr.arpa domain name pointer 71-34-214-113.ksca.qwest.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.214.34.71.in-addr.arpa	name = 71-34-214-113.ksca.qwest.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.244.75.97 attackbotsspam
fire
2019-11-17 02:17:59
222.184.232.220 attackbots
firewall-block, port(s): 1433/tcp
2019-11-17 01:57:40
195.16.41.170 attack
Automatic report - Banned IP Access
2019-11-17 02:19:07
157.245.73.144 attackspam
Nov 16 17:43:46 game-panel sshd[24106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.73.144
Nov 16 17:43:49 game-panel sshd[24106]: Failed password for invalid user xbmc from 157.245.73.144 port 43762 ssh2
Nov 16 17:52:05 game-panel sshd[24303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.73.144
2019-11-17 02:03:21
117.240.186.218 attackspam
445/tcp
[2019-11-16]1pkt
2019-11-17 02:17:02
191.37.227.229 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-17 02:05:07
148.70.4.242 attackspambots
Nov 16 17:26:02 sauna sshd[38007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.4.242
Nov 16 17:26:04 sauna sshd[38007]: Failed password for invalid user mertz from 148.70.4.242 port 40682 ssh2
...
2019-11-17 02:09:48
173.177.141.211 attackspambots
23/tcp
[2019-11-16]1pkt
2019-11-17 02:00:48
117.40.255.197 attackspambots
fire
2019-11-17 01:42:44
104.248.95.188 attackbots
fire
2019-11-17 02:12:35
41.222.196.57 attackbots
Brute-force attempt banned
2019-11-17 02:04:20
222.186.173.215 attackbots
Nov 16 18:55:54 sd-53420 sshd\[29805\]: User root from 222.186.173.215 not allowed because none of user's groups are listed in AllowGroups
Nov 16 18:55:54 sd-53420 sshd\[29805\]: Failed none for invalid user root from 222.186.173.215 port 18916 ssh2
Nov 16 18:55:54 sd-53420 sshd\[29805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Nov 16 18:55:55 sd-53420 sshd\[29805\]: Failed password for invalid user root from 222.186.173.215 port 18916 ssh2
Nov 16 18:56:12 sd-53420 sshd\[29882\]: User root from 222.186.173.215 not allowed because none of user's groups are listed in AllowGroups
...
2019-11-17 01:57:12
12.10.12.179 attackspambots
fire
2019-11-17 01:42:11
104.248.145.18 attackspambots
fire
2019-11-17 02:17:30
110.235.192.100 attack
445/tcp
[2019-11-16]1pkt
2019-11-17 01:56:27

Recently Reported IPs

80.160.213.175 40.6.155.238 23.141.110.210 247.142.62.192
186.253.229.177 230.50.207.61 166.6.132.117 64.42.192.91
83.114.7.51 65.120.230.165 44.34.30.195 121.252.171.10
214.245.214.37 43.14.9.158 192.158.94.156 166.8.100.79
163.241.107.120 2.198.8.30 32.253.218.85 85.81.244.62