Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.70.181.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.70.181.80.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 06:08:20 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 80.181.70.149.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 149.70.181.80.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
41.73.213.186 attackspambots
Invalid user alexis from 41.73.213.186 port 54692
2020-08-22 05:01:08
122.51.192.105 attack
Brute-force attempt banned
2020-08-22 05:03:31
51.83.44.111 attackspambots
*Port Scan* detected from 51.83.44.111 (FR/France/Hauts-de-France/Gravelines/111.ip-51-83-44.eu). 4 hits in the last 251 seconds
2020-08-22 04:54:18
35.196.27.1 attackbots
Aug 21 22:47:40 cosmoit sshd[31037]: Failed password for root from 35.196.27.1 port 56696 ssh2
2020-08-22 05:04:00
198.12.225.100 attack
Unauthorized connection attempt detected, IP banned.
2020-08-22 05:23:55
144.34.248.9 attackbotsspam
Aug 21 20:09:45 XXX sshd[48577]: Invalid user mis from 144.34.248.9 port 58784
2020-08-22 05:06:43
154.73.2.13 attack
Aug 21 16:36:12 host sshd\[27892\]: Invalid user xerxes from 154.73.2.13
Aug 21 16:36:12 host sshd\[27892\]: Failed password for invalid user xerxes from 154.73.2.13 port 34128 ssh2
Aug 21 16:40:45 host sshd\[28989\]: Failed password for root from 154.73.2.13 port 43518 ssh2
...
2020-08-22 05:18:02
222.186.175.217 attackspam
Aug 21 23:01:34 vmd17057 sshd[27449]: Failed password for root from 222.186.175.217 port 47874 ssh2
Aug 21 23:01:38 vmd17057 sshd[27449]: Failed password for root from 222.186.175.217 port 47874 ssh2
...
2020-08-22 05:08:34
212.70.149.52 attackspambots
Aug 22 05:54:48 ns1 postfix/smtpd\[12868\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: authentication failure
Aug 22 05:55:16 ns1 postfix/smtpd\[12868\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: authentication failure
Aug 22 05:55:43 ns1 postfix/smtpd\[12868\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: authentication failure
Aug 22 05:56:10 ns1 postfix/smtpd\[12868\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: authentication failure
Aug 22 05:56:38 ns1 postfix/smtpd\[12868\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: authentication failure
...
2020-08-22 04:58:01
51.195.138.52 attackbots
Aug 21 23:12:14 home sshd[2867711]: Invalid user ping from 51.195.138.52 port 52028
Aug 21 23:12:14 home sshd[2867711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.138.52 
Aug 21 23:12:14 home sshd[2867711]: Invalid user ping from 51.195.138.52 port 52028
Aug 21 23:12:16 home sshd[2867711]: Failed password for invalid user ping from 51.195.138.52 port 52028 ssh2
Aug 21 23:15:47 home sshd[2868740]: Invalid user jy from 51.195.138.52 port 59954
...
2020-08-22 05:25:57
185.220.101.216 attackbots
Failed password for invalid user from 185.220.101.216 port 23372 ssh2
2020-08-22 05:24:57
34.105.225.119 attackbots
*Port Scan* detected from 34.105.225.119 (GB/United Kingdom/England/London/119.225.105.34.bc.googleusercontent.com). 4 hits in the last 225 seconds
2020-08-22 05:02:54
118.24.17.28 attackspam
Aug 20 03:42:50 rudra sshd[688464]: Invalid user em3-user from 118.24.17.28
Aug 20 03:42:50 rudra sshd[688464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.17.28 
Aug 20 03:42:52 rudra sshd[688464]: Failed password for invalid user em3-user from 118.24.17.28 port 41260 ssh2
Aug 20 03:42:53 rudra sshd[688464]: Received disconnect from 118.24.17.28: 11: Bye Bye [preauth]
Aug 20 03:48:24 rudra sshd[689588]: Invalid user eunho from 118.24.17.28
Aug 20 03:48:24 rudra sshd[689588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.17.28 
Aug 20 03:48:26 rudra sshd[689588]: Failed password for invalid user eunho from 118.24.17.28 port 44724 ssh2
Aug 20 03:48:26 rudra sshd[689588]: Received disconnect from 118.24.17.28: 11: Bye Bye [preauth]
Aug 20 03:51:21 rudra sshd[690160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.17.28  user=r........
-------------------------------
2020-08-22 05:24:13
51.75.53.141 attack
51.75.53.141 - - [21/Aug/2020:21:25:04 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [21/Aug/2020:21:25:05 +0100] "POST /wp-login.php HTTP/1.1" 200 1929 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.53.141 - - [21/Aug/2020:21:25:05 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-22 05:13:53
112.29.174.55 attackspambots
Icarus honeypot on github
2020-08-22 05:03:46

Recently Reported IPs

229.252.215.114 252.174.252.249 144.99.244.116 185.39.9.34
108.88.205.210 161.245.55.108 25.7.219.230 234.158.217.77
241.147.107.129 133.167.230.58 95.47.82.202 167.197.30.203
48.179.38.252 217.72.217.88 194.192.231.178 134.15.146.22
67.172.174.213 246.82.243.150 71.77.219.77 169.72.178.228