Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.131.221.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.131.221.70.			IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020083000 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 30 22:00:31 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 70.221.131.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.221.131.149.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
212.64.29.79 attackspam
Apr  4 22:41:34 ns382633 sshd\[30276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.29.79  user=root
Apr  4 22:41:37 ns382633 sshd\[30276\]: Failed password for root from 212.64.29.79 port 57586 ssh2
Apr  4 22:45:30 ns382633 sshd\[31093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.29.79  user=root
Apr  4 22:45:32 ns382633 sshd\[31093\]: Failed password for root from 212.64.29.79 port 43200 ssh2
Apr  4 22:47:14 ns382633 sshd\[31307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.29.79  user=root
2020-04-05 06:17:17
218.45.205.203 attackspambots
Automatic report - Port Scan Attack
2020-04-05 05:50:40
112.85.42.173 attackbots
Apr  5 05:46:31 bacztwo sshd[5474]: error: PAM: Authentication failure for root from 112.85.42.173
Apr  5 05:46:34 bacztwo sshd[5474]: error: PAM: Authentication failure for root from 112.85.42.173
Apr  5 05:46:37 bacztwo sshd[5474]: error: PAM: Authentication failure for root from 112.85.42.173
Apr  5 05:46:37 bacztwo sshd[5474]: Failed keyboard-interactive/pam for root from 112.85.42.173 port 48321 ssh2
Apr  5 05:46:28 bacztwo sshd[5474]: error: PAM: Authentication failure for root from 112.85.42.173
Apr  5 05:46:31 bacztwo sshd[5474]: error: PAM: Authentication failure for root from 112.85.42.173
Apr  5 05:46:34 bacztwo sshd[5474]: error: PAM: Authentication failure for root from 112.85.42.173
Apr  5 05:46:37 bacztwo sshd[5474]: error: PAM: Authentication failure for root from 112.85.42.173
Apr  5 05:46:37 bacztwo sshd[5474]: Failed keyboard-interactive/pam for root from 112.85.42.173 port 48321 ssh2
Apr  5 05:46:40 bacztwo sshd[5474]: error: PAM: Authentication failure for root fro
...
2020-04-05 05:48:57
106.54.139.117 attackbots
Invalid user yac from 106.54.139.117 port 35026
2020-04-05 05:47:32
157.230.231.39 attackspambots
Invalid user zu from 157.230.231.39 port 52070
2020-04-05 06:12:20
51.178.2.81 attackspambots
Apr  4 23:44:56 legacy sshd[15329]: Failed password for root from 51.178.2.81 port 55786 ssh2
Apr  4 23:48:36 legacy sshd[15422]: Failed password for root from 51.178.2.81 port 38964 ssh2
...
2020-04-05 06:08:44
182.18.252.29 attackspam
Invalid user caspar from 182.18.252.29 port 18337
2020-04-05 06:21:27
138.197.171.149 attack
SSH Invalid Login
2020-04-05 05:52:37
183.185.213.35 attack
23/tcp
[2020-04-04]1pkt
2020-04-05 05:51:09
106.13.232.184 attack
SSH brute force attempt
2020-04-05 05:59:12
192.99.244.225 attackspambots
Apr  4 22:13:00 ks10 sshd[2532827]: Failed password for root from 192.99.244.225 port 42356 ssh2
...
2020-04-05 06:08:03
51.91.77.103 attackspambots
$f2bV_matches
2020-04-05 06:13:57
59.10.5.156 attackspambots
Invalid user siddhant from 59.10.5.156 port 39374
2020-04-05 06:08:20
115.75.49.88 attackspambots
Unauthorised access (Apr  4) SRC=115.75.49.88 LEN=52 TTL=109 ID=16741 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-05 06:21:53
179.113.122.237 attack
Apr  4 23:44:43 legacy sshd[15306]: Failed password for root from 179.113.122.237 port 54196 ssh2
Apr  4 23:48:27 legacy sshd[15414]: Failed password for root from 179.113.122.237 port 54900 ssh2
Apr  4 23:52:09 legacy sshd[15529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.113.122.237
...
2020-04-05 05:58:52

Recently Reported IPs

109.8.16.100 212.35.167.44 156.67.214.196 111.7.186.38
87.117.51.9 95.235.165.195 184.82.195.210 31.170.56.81
123.185.123.161 223.22.243.180 179.222.123.239 179.231.233.20
68.8.135.242 217.150.40.45 116.107.74.150 101.226.253.162
118.69.63.208 106.39.31.13 230.131.77.173 103.87.212.10