Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.44.212.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.44.212.70.			IN	A

;; AUTHORITY SECTION:
.			394	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:33:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 70.212.44.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.212.44.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.143.221.50 attack
RDP brute force attack detected by fail2ban
2019-08-24 16:19:59
68.183.234.68 attackbots
Invalid user ky from 68.183.234.68 port 37492
2019-08-24 16:27:55
171.118.239.70 attackspam
Unauthorised access (Aug 24) SRC=171.118.239.70 LEN=40 TTL=49 ID=5906 TCP DPT=8080 WINDOW=36299 SYN 
Unauthorised access (Aug 24) SRC=171.118.239.70 LEN=40 TTL=49 ID=20418 TCP DPT=8080 WINDOW=55235 SYN 
Unauthorised access (Aug 23) SRC=171.118.239.70 LEN=40 TTL=49 ID=1184 TCP DPT=8080 WINDOW=53699 SYN 
Unauthorised access (Aug 23) SRC=171.118.239.70 LEN=40 TTL=49 ID=51035 TCP DPT=8080 WINDOW=38486 SYN
2019-08-24 16:29:14
112.252.17.80 attackspam
Port Scan: TCP/80
2019-08-24 15:49:31
60.29.241.2 attackspambots
(sshd) Failed SSH login from 60.29.241.2 (-): 5 in the last 3600 secs
2019-08-24 16:43:19
69.24.139.8 attackspambots
SMB Server BruteForce Attack
2019-08-24 16:36:16
54.39.46.244 attackbots
2019-08-24T08:50:25.402432mail01 postfix/smtpd[11700]: warning: ip244.ip-54-39-46.net[54.39.46.244]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-24T08:50:31.436710mail01 postfix/smtpd[11700]: warning: ip244.ip-54-39-46.net[54.39.46.244]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-24T08:50:41.461845mail01 postfix/smtpd[11700]: warning: ip244.ip-54-39-46.net[54.39.46.244]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-24 16:04:00
47.91.104.127 attack
Aug 24 14:44:25 webhost01 sshd[25903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.91.104.127
Aug 24 14:44:27 webhost01 sshd[25903]: Failed password for invalid user doreen from 47.91.104.127 port 46042 ssh2
...
2019-08-24 16:34:23
54.38.178.106 attackspambots
Port Scan: TCP/10000
2019-08-24 15:57:40
117.48.202.15 attack
Aug 24 04:38:17 debian sshd\[10207\]: Invalid user ts3server from 117.48.202.15 port 41411
Aug 24 04:38:17 debian sshd\[10207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.202.15
...
2019-08-24 16:07:47
159.89.225.82 attack
Invalid user dk from 159.89.225.82 port 36940
2019-08-24 16:13:16
114.69.232.130 attackbotsspam
proto=tcp  .  spt=42501  .  dpt=25  .     (listed on Blocklist de  Aug 23)     (130)
2019-08-24 16:35:20
177.47.24.226 attackspambots
Port Scan: TCP/445
2019-08-24 16:02:26
94.249.99.20 attackspambots
Port Scan: TCP/8080
2019-08-24 15:50:43
67.78.68.226 attackbots
Port Scan: UDP/137
2019-08-24 15:55:01

Recently Reported IPs

130.44.212.69 130.255.102.23 130.56.66.152 130.51.180.33
130.255.78.250 130.35.3.117 130.58.11.29 130.59.31.80
130.61.124.150 130.37.193.190 130.61.204.97 130.61.14.88
130.60.184.132 130.61.221.23 130.43.91.110 130.61.231.60
130.61.194.39 130.44.204.100 130.61.68.206 130.61.35.82