Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kunming

Region: Yunnan

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.54.70.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35727
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.54.70.12.			IN	A

;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071201 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jul 13 08:09:16 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 12.70.54.116.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 12.70.54.116.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.61 attack
detected by Fail2Ban
2019-12-28 05:19:41
201.120.93.121 attackbots
Unauthorized connection attempt from IP address 201.120.93.121 on Port 445(SMB)
2019-12-28 04:55:16
110.45.244.79 attack
Unauthorized SSH login attempts
2019-12-28 05:13:50
113.175.41.250 attackbots
Unauthorized connection attempt from IP address 113.175.41.250 on Port 445(SMB)
2019-12-28 05:05:05
112.45.114.75 attackspam
Unauthorized connection attempt from IP address 112.45.114.75 on Port 25(SMTP)
2019-12-28 05:17:11
103.95.40.213 attackbots
Unauthorized connection attempt from IP address 103.95.40.213 on Port 445(SMB)
2019-12-28 05:02:31
218.92.0.172 attackbotsspam
2019-12-27T09:49:04.695706homeassistant sshd[14475]: Failed password for root from 218.92.0.172 port 3091 ssh2
2019-12-27T20:50:54.931041homeassistant sshd[20973]: Failed none for root from 218.92.0.172 port 47058 ssh2
2019-12-27T20:50:55.145671homeassistant sshd[20973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
...
2019-12-28 05:07:27
174.27.176.142 attackbots
tcp 23
2019-12-28 04:54:11
108.185.98.250 attackspam
Automatic report - Port Scan Attack
2019-12-28 05:00:54
164.163.146.181 attack
Unauthorized connection attempt from IP address 164.163.146.181 on Port 445(SMB)
2019-12-28 05:19:17
196.22.215.250 attackspam
postfix (unknown user, SPF fail or relay access denied)
2019-12-28 04:57:50
139.59.15.78 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-28 05:23:43
110.5.5.140 attackbotsspam
SIP/5060 Probe, BF, Hack -
2019-12-28 05:21:08
106.12.36.42 attackbotsspam
2019-12-27T15:54:22.630735shield sshd\[3397\]: Invalid user test from 106.12.36.42 port 49366
2019-12-27T15:54:22.635084shield sshd\[3397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.42
2019-12-27T15:54:24.609059shield sshd\[3397\]: Failed password for invalid user test from 106.12.36.42 port 49366 ssh2
2019-12-27T15:58:14.523189shield sshd\[4707\]: Invalid user test from 106.12.36.42 port 42574
2019-12-27T15:58:14.527639shield sshd\[4707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.42
2019-12-28 04:49:53
66.113.195.23 attack
Unauthorized connection attempt from IP address 66.113.195.23 on Port 445(SMB)
2019-12-28 05:01:06

Recently Reported IPs

32.129.12.39 220.126.120.131 39.109.150.225 68.79.113.37
181.178.171.121 172.84.196.7 109.226.84.207 112.133.142.238
24.234.50.108 59.17.143.101 130.235.215.208 111.34.85.168
109.227.232.70 172.115.56.224 159.84.88.178 116.66.153.141
165.210.125.141 121.75.197.115 97.166.49.84 75.44.156.40