Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.249.69.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.249.69.70.			IN	A

;; AUTHORITY SECTION:
.			432	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110500 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 05 21:52:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
70.69.249.102.in-addr.arpa domain name pointer 8ta-249-69-70.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.69.249.102.in-addr.arpa	name = 8ta-249-69-70.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.38.132.29 attack
Dec 25 10:22:07 xxxxxxx0 sshd[8480]: Invalid user ching from 51.38.132.29 port 55864
Dec 25 10:22:09 xxxxxxx0 sshd[8480]: Failed password for invalid user ching from 51.38.132.29 port 55864 ssh2
Dec 25 10:31:28 xxxxxxx0 sshd[9829]: Failed password for backup from 51.38.132.29 port 53322 ssh2
Dec 25 10:33:05 xxxxxxx0 sshd[10078]: Failed password for lp from 51.38.132.29 port 41312 ssh2
Dec 25 10:34:36 xxxxxxx0 sshd[10376]: Failed password for r.r from 51.38.132.29 port 57530 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.38.132.29
2019-12-25 19:58:13
51.91.56.222 attackspambots
WordPress XMLRPC scan :: 51.91.56.222 0.100 BYPASS [25/Dec/2019:06:22:24  0000] [censored_4] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-25 19:39:58
210.57.214.70 attackbotsspam
proto=tcp  .  spt=41916  .  dpt=25  .     (Found on   Dark List de Dec 25)     (192)
2019-12-25 20:11:55
219.146.149.110 attack
Unauthorized connection attempt detected from IP address 219.146.149.110 to port 445
2019-12-25 20:07:48
171.245.239.68 attackspambots
1577254912 - 12/25/2019 07:21:52 Host: 171.245.239.68/171.245.239.68 Port: 445 TCP Blocked
2019-12-25 19:57:52
27.2.7.59 attackbotsspam
proto=tcp  .  spt=34426  .  dpt=25  .     (Found on   Blocklist de  Dec 24)     (194)
2019-12-25 20:08:28
95.165.160.46 attack
email spam
2019-12-25 19:41:00
117.67.218.22 attackspambots
Scanning
2019-12-25 19:54:50
113.61.180.20 attackspam
Fail2Ban Ban Triggered
2019-12-25 20:15:07
37.32.15.21 attackspambots
proto=tcp  .  spt=43010  .  dpt=25  .     (Found on   Blocklist de  Dec 24)     (202)
2019-12-25 19:53:10
63.80.184.145 attackspam
Dec 25 08:22:24 grey postfix/smtpd\[19379\]: NOQUEUE: reject: RCPT from nod.sapuxfiori.com\[63.80.184.145\]: 554 5.7.1 Service unavailable\; Client host \[63.80.184.145\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.80.184.145\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-25 19:41:45
114.239.64.69 attack
Scanning
2019-12-25 20:06:18
5.135.116.82 attack
fail2ban honeypot
2019-12-25 19:53:47
125.46.244.32 attack
Scanning
2019-12-25 20:19:14
123.138.111.246 attackspam
Automatic report - Port Scan
2019-12-25 20:18:08

Recently Reported IPs

115.111.67.151 203.99.185.66 174.94.35.43 153.85.87.78
153.121.11.217 44.211.240.104 96.40.242.229 250.135.106.78
241.170.70.114 185.197.30.1 3.254.9.32 44.233.97.154
154.132.171.113 153.45.108.118 158.28.246.214 103.175.40.5
202.177.196.18 139.180.138.67 86.166.231.201 102.202.238.90