Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.20.70.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;100.20.70.207.			IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100401 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 05 09:29:36 CST 2020
;; MSG SIZE  rcvd: 117
Host info
207.70.20.100.in-addr.arpa domain name pointer ec2-100-20-70-207.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.70.20.100.in-addr.arpa	name = ec2-100-20-70-207.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
206.81.24.64 attackspam
Aug 25 09:48:06 localhost sshd\[50382\]: Invalid user zw from 206.81.24.64 port 52466
Aug 25 09:48:06 localhost sshd\[50382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.64
Aug 25 09:48:08 localhost sshd\[50382\]: Failed password for invalid user zw from 206.81.24.64 port 52466 ssh2
Aug 25 09:52:09 localhost sshd\[50565\]: Invalid user is from 206.81.24.64 port 43798
Aug 25 09:52:09 localhost sshd\[50565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.64
...
2019-08-26 00:44:53
178.62.252.89 attackbotsspam
Aug 25 07:54:49 game-panel sshd[2749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.252.89
Aug 25 07:54:51 game-panel sshd[2749]: Failed password for invalid user dis from 178.62.252.89 port 50570 ssh2
Aug 25 07:58:42 game-panel sshd[2872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.252.89
2019-08-26 00:31:36
49.88.112.68 attack
Aug 25 11:32:00 mail sshd\[20607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
Aug 25 11:32:02 mail sshd\[20607\]: Failed password for root from 49.88.112.68 port 36357 ssh2
...
2019-08-26 01:15:50
106.13.39.193 attack
F2B jail: sshd. Time: 2019-08-25 11:54:04, Reported by: VKReport
2019-08-26 01:09:31
58.140.91.76 attack
Aug 25 18:40:29 localhost sshd\[2538\]: Invalid user natasha from 58.140.91.76 port 30795
Aug 25 18:40:29 localhost sshd\[2538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.140.91.76
Aug 25 18:40:30 localhost sshd\[2538\]: Failed password for invalid user natasha from 58.140.91.76 port 30795 ssh2
2019-08-26 00:40:36
51.38.176.147 attackspambots
Aug 25 16:11:30 vps647732 sshd[10601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.176.147
Aug 25 16:11:32 vps647732 sshd[10601]: Failed password for invalid user adm from 51.38.176.147 port 43664 ssh2
...
2019-08-26 00:35:24
165.22.143.139 attackbots
2019-08-25T13:49:02.739553abusebot-4.cloudsearch.cf sshd\[7992\]: Invalid user cumulus from 165.22.143.139 port 38544
2019-08-26 01:03:12
54.210.130.25 attackbots
by Amazon Technologies Inc.
2019-08-26 00:52:11
133.130.121.206 attack
Automatic report - Banned IP Access
2019-08-26 01:04:33
177.17.171.109 attackspam
Automatic report - Port Scan Attack
2019-08-26 01:15:12
198.199.79.17 attackspam
Aug 25 16:49:04 root sshd[15723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.79.17 
Aug 25 16:49:06 root sshd[15723]: Failed password for invalid user isaac from 198.199.79.17 port 39276 ssh2
Aug 25 16:53:20 root sshd[15766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.79.17 
...
2019-08-26 01:21:09
146.148.107.113 attack
Aug 25 12:52:45 dedicated sshd[31227]: Invalid user alex from 146.148.107.113 port 42886
2019-08-26 00:29:43
122.195.200.148 attack
2019-08-25T15:59:54.690858abusebot-7.cloudsearch.cf sshd\[32388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
2019-08-26 00:26:40
110.164.198.244 attackbotsspam
Aug 25 06:52:56 sachi sshd\[22942\]: Invalid user vagner from 110.164.198.244
Aug 25 06:52:56 sachi sshd\[22942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.198.244
Aug 25 06:52:58 sachi sshd\[22942\]: Failed password for invalid user vagner from 110.164.198.244 port 60082 ssh2
Aug 25 06:57:57 sachi sshd\[23404\]: Invalid user web-admin from 110.164.198.244
Aug 25 06:57:57 sachi sshd\[23404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.198.244
2019-08-26 01:13:56
108.60.244.5 attackspambots
Automatic report - Port Scan Attack
2019-08-26 00:27:48

Recently Reported IPs

102.247.177.57 36.82.241.67 220.118.36.3 173.94.248.122
36.19.12.214 183.154.224.110 168.253.146.160 118.157.135.126
59.115.59.123 100.174.252.10 35.238.55.205 93.228.16.60
86.75.33.28 137.97.89.98 46.187.20.254 85.172.240.62
88.136.239.83 92.218.224.198 98.153.189.93 37.94.95.204