Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.70.194.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.70.194.97.			IN	A

;; AUTHORITY SECTION:
.			573	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:13:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 97.194.70.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.194.70.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.159.67.245 attackspam
2019-07-19T22:14:04.249122ns1.unifynetsol.net webmin\[3680\]: Invalid login as root from 89.159.67.245
2019-07-19T22:14:09.723507ns1.unifynetsol.net webmin\[3685\]: Invalid login as root from 89.159.67.245
2019-07-19T22:14:15.198662ns1.unifynetsol.net webmin\[3686\]: Invalid login as root from 89.159.67.245
2019-07-19T22:14:20.655114ns1.unifynetsol.net webmin\[3687\]: Invalid login as root from 89.159.67.245
2019-07-19T22:14:26.152569ns1.unifynetsol.net webmin\[3688\]: Invalid login as root from 89.159.67.245
2019-07-20 03:04:20
193.34.145.18 attackspambots
Wordpress Admin Login attack
2019-07-20 03:14:27
185.23.83.225 attackspambots
[portscan] Port scan
2019-07-20 03:12:01
61.19.208.34 attackbots
445/tcp 445/tcp 445/tcp...
[2019-06-10/07-19]7pkt,1pt.(tcp)
2019-07-20 03:14:55
137.74.44.72 attackbots
Jul 17 09:41:36 km20725 sshd[27649]: Invalid user xu from 137.74.44.72
Jul 17 09:41:38 km20725 sshd[27649]: Failed password for invalid user xu from 137.74.44.72 port 39994 ssh2
Jul 17 09:41:38 km20725 sshd[27649]: Received disconnect from 137.74.44.72: 11: Bye Bye [preauth]
Jul 17 09:46:57 km20725 sshd[27911]: Invalid user customer1 from 137.74.44.72
Jul 17 09:47:00 km20725 sshd[27911]: Failed password for invalid user customer1 from 137.74.44.72 port 47684 ssh2
Jul 17 09:47:00 km20725 sshd[27911]: Received disconnect from 137.74.44.72: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=137.74.44.72
2019-07-20 03:13:22
51.83.72.108 attackspambots
Jul 19 14:45:34 vps200512 sshd\[4984\]: Invalid user user from 51.83.72.108
Jul 19 14:45:34 vps200512 sshd\[4984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.108
Jul 19 14:45:36 vps200512 sshd\[4984\]: Failed password for invalid user user from 51.83.72.108 port 42880 ssh2
Jul 19 14:50:03 vps200512 sshd\[5060\]: Invalid user bcbackup from 51.83.72.108
Jul 19 14:50:03 vps200512 sshd\[5060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.108
2019-07-20 03:05:35
189.10.97.19 attackspam
445/tcp 445/tcp 445/tcp...
[2019-05-21/07-19]13pkt,1pt.(tcp)
2019-07-20 02:42:19
51.77.210.216 attackbots
2019-07-19T19:24:16.129682lon01.zurich-datacenter.net sshd\[29670\]: Invalid user vodafone from 51.77.210.216 port 39420
2019-07-19T19:24:16.135780lon01.zurich-datacenter.net sshd\[29670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.ip-51-77-210.eu
2019-07-19T19:24:17.971768lon01.zurich-datacenter.net sshd\[29670\]: Failed password for invalid user vodafone from 51.77.210.216 port 39420 ssh2
2019-07-19T19:28:38.965609lon01.zurich-datacenter.net sshd\[29747\]: Invalid user kross from 51.77.210.216 port 34910
2019-07-19T19:28:38.971663lon01.zurich-datacenter.net sshd\[29747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.ip-51-77-210.eu
...
2019-07-20 02:35:21
49.207.181.191 attackbots
Unauthorised access (Jul 19) SRC=49.207.181.191 LEN=40 PREC=0x20 TTL=238 ID=12154 TCP DPT=445 WINDOW=1024 SYN
2019-07-20 02:46:16
192.99.28.247 attack
Jul 19 20:13:36 SilenceServices sshd[22930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.28.247
Jul 19 20:13:38 SilenceServices sshd[22930]: Failed password for invalid user facturacion from 192.99.28.247 port 57907 ssh2
Jul 19 20:18:09 SilenceServices sshd[26034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.28.247
2019-07-20 02:37:43
134.73.161.132 attackbots
Automatic report - SSH Brute-Force Attack
2019-07-20 02:32:45
103.228.112.192 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.192  user=root
Failed password for root from 103.228.112.192 port 43872 ssh2
Invalid user riley from 103.228.112.192 port 40440
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.192
Failed password for invalid user riley from 103.228.112.192 port 40440 ssh2
2019-07-20 03:05:09
45.13.39.167 attack
Jul 17 16:20:39 rigel postfix/smtpd[15122]: connect from unknown[45.13.39.167]
Jul 17 16:20:39 rigel postfix/smtpd[15129]: connect from unknown[45.13.39.167]
Jul 17 16:20:42 rigel postfix/smtpd[15130]: connect from unknown[45.13.39.167]
Jul 17 16:20:44 rigel postfix/smtpd[15129]: warning: unknown[45.13.39.167]: SASL LOGIN authentication failed: authentication failure
Jul 17 16:20:45 rigel postfix/smtpd[15129]: disconnect from unknown[45.13.39.167]
Jul 17 16:20:46 rigel postfix/smtpd[15130]: warning: unknown[45.13.39.167]: SASL LOGIN authentication failed: authentication failure
Jul 17 16:20:47 rigel postfix/smtpd[15130]: disconnect from unknown[45.13.39.167]
Jul 17 16:20:47 rigel postfix/smtpd[15122]: warning: unknown[45.13.39.167]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.13.39.167
2019-07-20 02:48:15
96.45.178.13 attackspam
kidness.family 96.45.178.13 \[19/Jul/2019:18:44:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5569 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
kidness.family 96.45.178.13 \[19/Jul/2019:18:44:46 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4087 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-20 02:51:37
81.241.235.191 attackspam
Jul 19 20:48:31 MK-Soft-Root1 sshd\[26710\]: Invalid user marlene from 81.241.235.191 port 42154
Jul 19 20:48:31 MK-Soft-Root1 sshd\[26710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.241.235.191
Jul 19 20:48:33 MK-Soft-Root1 sshd\[26710\]: Failed password for invalid user marlene from 81.241.235.191 port 42154 ssh2
...
2019-07-20 03:00:45

Recently Reported IPs

13.70.18.41 13.70.178.87 13.70.17.111 13.70.17.41
13.70.187.110 118.172.158.28 13.70.189.210 13.70.199.201
13.70.201.193 13.70.3.189 13.70.206.247 13.70.34.24
13.70.34.127 13.70.46.229 13.70.49.149 13.70.46.175
13.70.36.78 13.70.4.26 118.172.158.33 13.70.57.206