Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Oracle Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.70.45.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47477
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;152.70.45.119.			IN	A

;; AUTHORITY SECTION:
.			3021	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061900 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 19 16:00:48 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 119.45.70.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 119.45.70.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.158.105.226 attackspam
SSH_attack
2020-06-26 20:09:41
177.44.208.107 attackbots
Jun 26 13:25:25 backup sshd[13129]: Failed password for root from 177.44.208.107 port 46674 ssh2
Jun 26 13:30:15 backup sshd[13220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.44.208.107 
...
2020-06-26 20:02:09
212.47.241.15 attackspambots
Jun 26 13:30:13 pornomens sshd\[10690\]: Invalid user ubuntu from 212.47.241.15 port 37666
Jun 26 13:30:13 pornomens sshd\[10690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.241.15
Jun 26 13:30:15 pornomens sshd\[10690\]: Failed password for invalid user ubuntu from 212.47.241.15 port 37666 ssh2
...
2020-06-26 19:58:12
167.99.66.158 attack
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-26 20:23:01
85.209.0.128 attackbots
Triggered: repeated knocking on closed ports.
2020-06-26 20:24:29
185.176.27.210 attackspam
06/26/2020-08:08:15.521946 185.176.27.210 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-26 20:08:24
209.17.97.2 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-06-26 20:05:36
157.157.87.22 attackbotsspam
2020-06-26 06:27:44.562053-0500  localhost sshd[67875]: Failed password for root from 157.157.87.22 port 44554 ssh2
2020-06-26 20:12:05
68.183.153.161 attackbotsspam
 TCP (SYN) 68.183.153.161:55535 -> port 7212, len 44
2020-06-26 20:21:04
67.42.135.186 attackspambots
Automatic report - Port Scan Attack
2020-06-26 19:51:11
118.27.5.46 attackspambots
Jun 26 08:08:04 NPSTNNYC01T sshd[18884]: Failed password for root from 118.27.5.46 port 45960 ssh2
Jun 26 08:11:36 NPSTNNYC01T sshd[19254]: Failed password for root from 118.27.5.46 port 45954 ssh2
Jun 26 08:15:05 NPSTNNYC01T sshd[19588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.5.46
...
2020-06-26 20:15:24
185.94.111.1 attackspam
UDP port : 11211
2020-06-26 19:50:32
190.129.12.139 attackbotsspam
Unauthorized connection attempt: SRC=190.129.12.139
...
2020-06-26 19:59:38
139.155.35.114 attack
General_bad_requests
2020-06-26 20:28:48
37.146.78.59 attack
Unauthorized connection attempt from IP address 37.146.78.59 on Port 3389(RDP)
2020-06-26 20:14:36

Recently Reported IPs

86.121.154.203 75.214.1.190 159.192.192.204 128.147.98.211
61.19.202.99 198.74.57.170 132.80.121.159 106.154.244.3
118.114.232.175 113.238.125.150 88.79.66.219 51.13.25.95
120.2.42.70 185.204.118.116 176.129.40.184 36.24.194.235
220.134.29.59 134.198.124.118 34.223.237.100 144.85.198.242