Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.70.75.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.70.75.212.			IN	A

;; AUTHORITY SECTION:
.			440	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110200 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 21:49:53 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 212.75.70.159.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 212.75.70.159.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
2.88.245.178 attackbots
Automatic report - Port Scan Attack
2020-04-16 16:11:59
188.83.98.193 attack
Automatic report - Port Scan Attack
2020-04-16 16:19:47
27.128.168.12 attackbotsspam
Apr 16 09:57:14 lukav-desktop sshd\[27666\]: Invalid user user3 from 27.128.168.12
Apr 16 09:57:14 lukav-desktop sshd\[27666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.168.12
Apr 16 09:57:16 lukav-desktop sshd\[27666\]: Failed password for invalid user user3 from 27.128.168.12 port 43022 ssh2
Apr 16 10:00:13 lukav-desktop sshd\[27790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.168.12  user=root
Apr 16 10:00:15 lukav-desktop sshd\[27790\]: Failed password for root from 27.128.168.12 port 60156 ssh2
2020-04-16 15:41:09
77.42.83.73 attack
Automatic report - Port Scan Attack
2020-04-16 15:45:41
103.212.211.164 attackspam
$f2bV_matches
2020-04-16 15:43:47
203.189.208.237 attackbots
Apr 16 05:51:15 vmd48417 sshd[13877]: Failed password for root from 203.189.208.237 port 16392 ssh2
2020-04-16 16:09:52
167.71.111.16 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-04-16 16:00:22
51.15.152.61 attack
Port scan detected on ports: 7800[UDP], 9999[UDP], 5560[UDP]
2020-04-16 16:19:04
51.137.88.237 attack
(sshd) Failed SSH login from 51.137.88.237 (NL/Netherlands/-): 5 in the last 3600 secs
2020-04-16 15:58:12
77.42.86.62 attackbots
Automatic report - Port Scan Attack
2020-04-16 16:18:26
62.210.140.151 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-04-16 16:04:59
106.12.172.91 attackbotsspam
Apr 16 05:48:36 124388 sshd[14464]: Invalid user test from 106.12.172.91 port 33872
Apr 16 05:48:36 124388 sshd[14464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.91
Apr 16 05:48:36 124388 sshd[14464]: Invalid user test from 106.12.172.91 port 33872
Apr 16 05:48:39 124388 sshd[14464]: Failed password for invalid user test from 106.12.172.91 port 33872 ssh2
Apr 16 05:51:35 124388 sshd[14494]: Invalid user deploy from 106.12.172.91 port 40898
2020-04-16 16:13:15
108.166.37.167 attackbotsspam
Invalid user ubuntu from 108.166.37.167 port 22025
2020-04-16 15:47:26
142.93.60.53 attackbotsspam
Invalid user marco from 142.93.60.53 port 33518
2020-04-16 16:16:59
49.232.66.254 attackspam
Apr 15 21:30:29 mockhub sshd[5374]: Failed password for root from 49.232.66.254 port 53820 ssh2
...
2020-04-16 15:46:39

Recently Reported IPs

79.64.104.215 196.105.105.154 44.101.208.213 59.104.4.226
90.124.81.140 111.81.190.216 113.17.42.4 48.127.142.52
134.26.26.28 147.54.8.184 27.25.104.19 235.215.173.111
205.209.159.125 159.30.79.121 109.236.75.170 220.181.11.38
88.195.182.138 121.250.222.138 245.222.250.97 126.2.43.253