Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
118.70.68.216 attackbots
1593316643 - 06/28/2020 05:57:23 Host: 118.70.68.216/118.70.68.216 Port: 445 TCP Blocked
2020-06-28 12:03:07
118.70.68.56 attack
20/3/8@23:49:17: FAIL: Alarm-Network address from=118.70.68.56
20/3/8@23:49:17: FAIL: Alarm-Network address from=118.70.68.56
...
2020-03-09 15:59:01
118.70.68.67 attackspambots
Unauthorized connection attempt detected from IP address 118.70.68.67 to port 1433
2020-02-25 22:46:17
118.70.68.113 attackspam
1580656160 - 02/02/2020 16:09:20 Host: 118.70.68.113/118.70.68.113 Port: 445 TCP Blocked
2020-02-03 00:06:30
118.70.68.91 attackspam
20/1/30@16:40:04: FAIL: Alarm-Network address from=118.70.68.91
...
2020-01-31 05:51:44
118.70.68.77 attackspambots
1578316309 - 01/06/2020 14:11:49 Host: 118.70.68.77/118.70.68.77 Port: 445 TCP Blocked
2020-01-06 23:43:20
118.70.68.106 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 03-01-2020 13:05:14.
2020-01-03 23:43:48
118.70.68.4 attack
Unauthorized connection attempt detected from IP address 118.70.68.4 to port 445
2019-12-30 09:35:50
118.70.68.98 attackspambots
Unauthorized connection attempt from IP address 118.70.68.98 on Port 445(SMB)
2019-12-06 03:12:24
118.70.68.237 attackspambots
445/tcp
[2019-11-06]1pkt
2019-11-06 13:13:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.70.68.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20429
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.70.68.12.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 02:02:23 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 12.68.70.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.68.70.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.197.194.78 attackspambots
Unauthorized connection attempt detected from IP address 151.197.194.78 to port 5555
2020-05-31 23:23:27
107.172.5.101 attack
Unauthorized connection attempt detected from IP address 107.172.5.101 to port 9002
2020-05-31 22:53:05
98.236.57.166 attackspambots
Unauthorized connection attempt detected from IP address 98.236.57.166 to port 81
2020-05-31 22:54:36
111.160.110.146 attack
Unauthorized connection attempt detected from IP address 111.160.110.146 to port 1433
2020-05-31 22:51:55
222.186.42.155 attackspambots
May 31 17:06:41 h2646465 sshd[22392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
May 31 17:06:42 h2646465 sshd[22392]: Failed password for root from 222.186.42.155 port 21209 ssh2
May 31 17:06:45 h2646465 sshd[22392]: Failed password for root from 222.186.42.155 port 21209 ssh2
May 31 17:06:41 h2646465 sshd[22392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
May 31 17:06:42 h2646465 sshd[22392]: Failed password for root from 222.186.42.155 port 21209 ssh2
May 31 17:06:45 h2646465 sshd[22392]: Failed password for root from 222.186.42.155 port 21209 ssh2
May 31 17:06:41 h2646465 sshd[22392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
May 31 17:06:42 h2646465 sshd[22392]: Failed password for root from 222.186.42.155 port 21209 ssh2
May 31 17:06:45 h2646465 sshd[22392]: Failed password for root from 222.1
2020-05-31 23:08:27
125.142.131.114 attackspambots
Unauthorized connection attempt detected from IP address 125.142.131.114 to port 23
2020-05-31 22:48:07
171.121.220.55 attackspam
Unauthorized connection attempt detected from IP address 171.121.220.55 to port 25
2020-05-31 22:45:07
79.8.96.118 attackbots
Hacking
2020-05-31 22:57:24
95.0.141.142 attackspambots
Unauthorized connection attempt detected from IP address 95.0.141.142 to port 23
2020-05-31 22:55:26
149.200.210.160 attackbotsspam
Unauthorized connection attempt detected from IP address 149.200.210.160 to port 445
2020-05-31 23:23:45
171.118.84.210 attackspambots
Unauthorized connection attempt detected from IP address 171.118.84.210 to port 23
2020-05-31 22:45:29
71.183.79.85 attackspam
Unauthorized connection attempt detected from IP address 71.183.79.85 to port 445
2020-05-31 22:57:57
71.6.165.200 attackbotsspam
Unauthorized connection attempt detected from IP address 71.6.165.200 to port 4321
2020-05-31 22:58:16
177.85.61.241 attackspam
Unauthorized connection attempt detected from IP address 177.85.61.241 to port 2323
2020-05-31 23:21:38
118.139.245.89 attackspam
Unauthorized connection attempt detected from IP address 118.139.245.89 to port 81
2020-05-31 23:26:15

Recently Reported IPs

118.70.52.72 118.70.92.175 118.71.102.81 118.71.152.164
210.204.170.242 118.71.166.240 171.4.105.121 118.73.16.127
118.75.45.184 118.76.236.245 118.76.69.186 118.77.181.62
118.81.1.10 118.81.13.211 118.81.13.3 118.81.15.179
118.81.3.104 118.81.57.37 118.81.87.173 118.81.9.129