Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.70.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34298
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.70.99.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:42:47 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 99.70.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.70.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.47.76.59 attackbots
Unauthorized connection attempt detected from IP address 118.47.76.59 to port 23
2020-04-12 23:18:30
73.135.120.130 attackspambots
[ssh] SSH attack
2020-04-12 22:47:36
197.46.25.19 attack
Unauthorized connection attempt detected from IP address 197.46.25.19 to port 445
2020-04-12 23:13:42
202.166.174.27 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-12 23:13:06
91.207.175.108 attack
portscan
2020-04-12 23:10:25
95.168.171.153 attackbotsspam
Unauthorized connection attempt detected from IP address 95.168.171.153 to port 1722 [T]
2020-04-12 23:22:03
201.140.108.146 attackspambots
Honeypot attack, port: 445, PTR: 146.201-140-108.bestelclientes.com.mx.
2020-04-12 22:58:30
5.39.88.60 attack
Apr 12 21:17:04 itv-usvr-01 sshd[16958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.88.60  user=root
Apr 12 21:17:06 itv-usvr-01 sshd[16958]: Failed password for root from 5.39.88.60 port 57394 ssh2
Apr 12 21:26:45 itv-usvr-01 sshd[17292]: Invalid user jboss from 5.39.88.60
2020-04-12 22:49:25
175.211.233.28 attackbotsspam
Unauthorized connection attempt detected from IP address 175.211.233.28 to port 23
2020-04-12 23:16:10
190.38.35.136 attackspambots
Unauthorized connection attempt detected from IP address 190.38.35.136 to port 81
2020-04-12 23:14:11
199.195.251.227 attackspambots
Apr 12 12:07:07 *** sshd[27755]: Invalid user nigga from 199.195.251.227
2020-04-12 23:01:18
60.251.57.189 attack
Apr 12 15:54:39 meumeu sshd[23574]: Failed password for root from 60.251.57.189 port 40314 ssh2
Apr 12 15:57:27 meumeu sshd[23962]: Failed password for root from 60.251.57.189 port 57062 ssh2
Apr 12 16:00:17 meumeu sshd[24611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.57.189 
...
2020-04-12 22:55:06
77.42.92.57 attack
Automatic report - Port Scan Attack
2020-04-12 22:48:48
221.151.73.191 attack
Unauthorized connection attempt detected from IP address 221.151.73.191 to port 23
2020-04-12 23:31:16
14.140.95.157 attackbotsspam
Apr 12 17:40:55 taivassalofi sshd[175985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.140.95.157
Apr 12 17:40:57 taivassalofi sshd[175985]: Failed password for invalid user brady from 14.140.95.157 port 45698 ssh2
...
2020-04-12 22:44:51

Recently Reported IPs

1.20.70.108 1.20.71.207 1.20.71.200 1.20.71.169
1.20.71.230 1.20.80.142 1.20.80.156 104.16.126.28
1.20.80.186 1.20.80.173 1.20.80.2 1.20.80.182
1.20.80.16 1.20.80.194 1.20.80.232 1.20.80.240
1.20.80.26 1.20.80.30 1.20.80.37 1.20.80.58