Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alexandria

Region: Virginia

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: Cellco Partnership DBA Verizon Wireless

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.34.213.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46957
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;97.34.213.252.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 29 21:58:14 CST 2019
;; MSG SIZE  rcvd: 117

Host info
252.213.34.97.in-addr.arpa domain name pointer 252.sub-97-34-213.myvzw.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
252.213.34.97.in-addr.arpa	name = 252.sub-97-34-213.myvzw.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
152.136.157.34 attackbotsspam
Lines containing failures of 152.136.157.34
Apr 20 00:30:26 keyhelp sshd[11683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.157.34  user=r.r
Apr 20 00:30:29 keyhelp sshd[11683]: Failed password for r.r from 152.136.157.34 port 41788 ssh2
Apr 20 00:30:29 keyhelp sshd[11683]: Received disconnect from 152.136.157.34 port 41788:11: Bye Bye [preauth]
Apr 20 00:30:29 keyhelp sshd[11683]: Disconnected from authenticating user r.r 152.136.157.34 port 41788 [preauth]
Apr 20 00:43:30 keyhelp sshd[15727]: Invalid user test3 from 152.136.157.34 port 50684
Apr 20 00:43:30 keyhelp sshd[15727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.157.34
Apr 20 00:43:32 keyhelp sshd[15727]: Failed password for invalid user test3 from 152.136.157.34 port 50684 ssh2
Apr 20 00:43:32 keyhelp sshd[15727]: Received disconnect from 152.136.157.34 port 50684:11: Bye Bye [preauth]
Apr 20 00:43:32 keyh........
------------------------------
2020-04-20 19:54:01
179.191.224.126 attack
$f2bV_matches
2020-04-20 20:15:23
221.229.197.81 attackspam
Apr 20 14:00:51 sso sshd[6501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.229.197.81
Apr 20 14:00:53 sso sshd[6501]: Failed password for invalid user home from 221.229.197.81 port 9224 ssh2
...
2020-04-20 20:03:05
78.157.225.42 attackbotsspam
Telnetd brute force attack detected by fail2ban
2020-04-20 19:53:00
130.185.155.34 attackbotsspam
Apr 20 12:13:46 game-panel sshd[7302]: Failed password for root from 130.185.155.34 port 51662 ssh2
Apr 20 12:17:58 game-panel sshd[7463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.185.155.34
Apr 20 12:17:59 game-panel sshd[7463]: Failed password for invalid user admin from 130.185.155.34 port 41018 ssh2
2020-04-20 20:23:01
128.199.182.158 attack
Invalid user fk from 128.199.182.158 port 47828
2020-04-20 20:26:22
122.183.104.126 attack
Invalid user vincent from 122.183.104.126 port 35698
2020-04-20 20:27:36
112.3.30.18 attackbotsspam
sshd jail - ssh hack attempt
2020-04-20 19:53:35
194.58.97.245 attackbotsspam
Invalid user test3 from 194.58.97.245 port 55418
2020-04-20 20:10:29
217.107.194.52 attackbotsspam
0,31-01/01 [bc01/m04] PostRequest-Spammer scoring: zurich
2020-04-20 19:56:37
150.136.154.228 attackbotsspam
Apr 20 14:18:42 santamaria sshd\[7420\]: Invalid user postgres from 150.136.154.228
Apr 20 14:18:42 santamaria sshd\[7420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.154.228
Apr 20 14:18:44 santamaria sshd\[7420\]: Failed password for invalid user postgres from 150.136.154.228 port 10248 ssh2
...
2020-04-20 20:19:52
184.105.139.120 attack
scanner
2020-04-20 19:49:50
37.59.232.6 attack
5x Failed Password
2020-04-20 19:52:03
95.111.74.98 attackspambots
Apr 20 01:40:23 php1 sshd\[15164\]: Invalid user postgres from 95.111.74.98
Apr 20 01:40:23 php1 sshd\[15164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
Apr 20 01:40:26 php1 sshd\[15164\]: Failed password for invalid user postgres from 95.111.74.98 port 41906 ssh2
Apr 20 01:44:41 php1 sshd\[15578\]: Invalid user ftpuser1 from 95.111.74.98
Apr 20 01:44:41 php1 sshd\[15578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
2020-04-20 19:51:49
189.112.12.107 attackspambots
Invalid user admin from 189.112.12.107 port 57538
2020-04-20 20:11:16

Recently Reported IPs

212.83.157.239 83.67.181.175 185.248.160.125 4.114.75.188
86.98.65.81 111.147.19.35 23.102.65.1 90.143.215.184
77.8.170.240 62.210.157.10 42.155.18.12 182.50.135.57
86.203.15.84 214.12.85.251 202.142.167.188 44.53.153.132
36.152.122.5 14.91.171.171 189.10.254.29 103.224.234.92