Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.129.6.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.129.6.70.			IN	A

;; AUTHORITY SECTION:
.			15	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:55:36 CST 2022
;; MSG SIZE  rcvd: 105
Host info
70.6.129.162.in-addr.arpa domain name pointer jira.jh.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.6.129.162.in-addr.arpa	name = jira.jh.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.107.128.170 attack
Auto Detect Rule!
proto TCP (SYN), 58.107.128.170:47043->gjan.info:23, len 44
2020-07-22 04:01:08
52.149.134.26 attack
Unauthorized connection attempt detected from IP address 52.149.134.26 to port 1433 [T]
2020-07-22 03:45:08
45.129.33.19 attackbotsspam
Jul 21 21:57:54 debian-2gb-nbg1-2 kernel: \[17620007.620282\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.129.33.19 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=24729 PROTO=TCP SPT=49451 DPT=47925 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-22 04:02:58
81.248.44.206 attackbots
Unauthorized connection attempt detected from IP address 81.248.44.206 to port 445 [T]
2020-07-22 04:16:40
103.134.92.146 attackspambots
Unauthorized connection attempt detected from IP address 103.134.92.146 to port 8080 [T]
2020-07-22 04:14:23
104.43.240.109 attack
2020-07-22 04:13:58
79.232.172.18 attack
Invalid user 123 from 79.232.172.18 port 57836
2020-07-22 03:42:37
193.150.101.181 attackspam
Unauthorized connection attempt detected from IP address 193.150.101.181 to port 445 [T]
2020-07-22 03:51:26
84.38.187.64 attackbotsspam
 TCP (SYN) 84.38.187.64:24446 -> port 3350, len 44
2020-07-22 03:42:11
164.52.24.182 attack
Unauthorized connection attempt detected from IP address 164.52.24.182 to port 5222 [T]
2020-07-22 04:10:29
13.78.148.210 attackbots
2020-07-22 04:06:24
164.52.24.175 attackspambots
Unauthorized connection attempt detected from IP address 164.52.24.175 to port 830 [T]
2020-07-22 04:11:53
92.118.161.37 attack
" "
2020-07-22 03:41:52
40.78.86.207 attack
Unauthorized connection attempt detected from IP address 40.78.86.207 to port 1433 [T]
2020-07-22 04:05:06
192.35.169.26 attackspambots
Honeypot hit.
2020-07-22 03:51:52

Recently Reported IPs

162.119.200.164 162.125.248.18 162.123.18.45 162.12.210.33
162.125.248.21 162.125.34.12 162.12.206.6 162.123.18.140
162.13.135.188 162.13.135.189 162.13.106.151 162.13.141.153
162.13.103.170 162.13.16.41 162.13.173.210 162.13.178.183
162.13.194.115 162.13.100.237 162.13.197.191 162.13.190.30