← Back to Dashboard

35.222.117.243 Threat Intelligence Report

Risk Level: CRITICAL — 341 abuse reports from 29 sources

Threat Intelligence Summary

IP address 35.222.117.243 has been flagged in 341 abuse reports across 29 independent threat intelligence sources, resulting in a threat score of 100.0/100 (critical risk). The primary activity associated with this IP is abuseipdb blacklist, along with aggregated threat, aggressive scanner, attacks, brute force, bruteforce, known attacker, malware c2, malware infrastructure, persistent attacker, rdp bruteforce, reconnaissance, scanning, ssh brute force, ssh bruteforce, suspicious activity, unknown, voip attack, web attack, web brute force.

This IP is geolocated in United States (Council Bluffs) and belongs to the network Google LLC (AS396982). Reports span from 2022-12-07 to 2026-04-17.

Assessment: With 341 abuse reports, 35.222.117.243 shows persistent malicious activity that has been flagged by multiple threat intelligence feeds. The IP has been observed conducting automated SSH login attempts against internet-facing servers, a technique commonly used to gain unauthorized access to systems. This IP belongs to Google LLC, a major cloud/hosting provider — the malicious activity likely originates from a compromised or rented virtual server rather than the provider's own infrastructure.

Data aggregated from 29 independent threat intelligence sources.

Geolocation

Country United States
City Council Bluffs
Region Iowa
ISP/ASN Google LLC
Timezone America/Chicago

Threat Status

Overall Status Critical
Threat Score 100.0%
Report Count 341
Sources 29
First Seen 2022-12-07
Last Seen 2026-04-17
AI Analysis

Check IPs automatically with the WAYSCloud API

Free tier: 1,000 lookups/day. Get threat scores, geolocation, and abuse reports via REST API.

Explore the API →

See how we classify and verify threats →

Related Intelligence

United States Threat Intelligence → AS396982 Network Intelligence → See all top malicious IPs → View latest attacks →
Learn about these threats: