Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.207.42.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.207.42.70.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 20:02:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
70.42.207.166.in-addr.arpa domain name pointer mobile-166-207-42-70.mycingular.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.42.207.166.in-addr.arpa	name = mobile-166-207-42-70.mycingular.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
191.54.133.28 attackspam
k+ssh-bruteforce
2020-03-27 20:52:09
103.56.206.231 attackspambots
SSH login attempts.
2020-03-27 20:50:26
103.203.95.14 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/103.203.95.14/ 
 
 BD - 1H : (7)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BD 
 NAME ASN : ASN134841 
 
 IP : 103.203.95.14 
 
 CIDR : 103.203.95.0/24 
 
 PREFIX COUNT : 5 
 
 UNIQUE IP COUNT : 1280 
 
 
 ATTACKS DETECTED ASN134841 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-03-27 13:32:11 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2020-03-27 20:50:05
115.68.84.15 attackbotsspam
SSH login attempts.
2020-03-27 21:10:42
116.108.105.131 attackspam
Automatic report - Port Scan Attack
2020-03-27 20:40:12
128.199.137.252 attackspambots
$f2bV_matches
2020-03-27 20:36:53
106.51.113.15 attack
Invalid user tomcat from 106.51.113.15 port 41816
2020-03-27 21:08:45
111.229.76.117 attack
Mar 21 16:47:10 itv-usvr-01 sshd[21108]: Invalid user mckenzie from 111.229.76.117
Mar 21 16:47:10 itv-usvr-01 sshd[21108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.76.117
Mar 21 16:47:10 itv-usvr-01 sshd[21108]: Invalid user mckenzie from 111.229.76.117
Mar 21 16:47:12 itv-usvr-01 sshd[21108]: Failed password for invalid user mckenzie from 111.229.76.117 port 42632 ssh2
Mar 21 16:52:31 itv-usvr-01 sshd[21296]: Invalid user vy from 111.229.76.117
2020-03-27 21:03:13
124.167.118.114 attackbots
SSH login attempts.
2020-03-27 21:02:43
111.229.125.124 attackbotsspam
Mar 25 16:06:26 itv-usvr-01 sshd[8173]: Invalid user test from 111.229.125.124
Mar 25 16:06:26 itv-usvr-01 sshd[8173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.125.124
Mar 25 16:06:26 itv-usvr-01 sshd[8173]: Invalid user test from 111.229.125.124
Mar 25 16:06:28 itv-usvr-01 sshd[8173]: Failed password for invalid user test from 111.229.125.124 port 48358 ssh2
2020-03-27 21:22:14
27.66.85.139 attack
Unauthorized connection attempt from IP address 27.66.85.139 on Port 445(SMB)
2020-03-27 21:05:07
196.38.70.24 attackspam
2020-03-27T13:12:26.879315shield sshd\[31865\]: Invalid user usa from 196.38.70.24 port 56076
2020-03-27T13:12:26.889316shield sshd\[31865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.38.70.24
2020-03-27T13:12:29.283858shield sshd\[31865\]: Failed password for invalid user usa from 196.38.70.24 port 56076 ssh2
2020-03-27T13:17:18.147760shield sshd\[585\]: Invalid user tdk from 196.38.70.24 port 11822
2020-03-27T13:17:18.156556shield sshd\[585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.38.70.24
2020-03-27 21:20:20
106.197.154.74 attackspambots
Unauthorized connection attempt from IP address 106.197.154.74 on Port 445(SMB)
2020-03-27 21:22:33
159.203.74.227 attackspambots
SSH login attempts.
2020-03-27 21:02:20
200.89.159.190 attackspambots
B: Abusive ssh attack
2020-03-27 20:39:45

Recently Reported IPs

85.43.47.211 51.27.159.245 229.66.122.175 231.163.84.156
249.12.65.200 193.199.97.197 229.197.40.37 57.131.252.119
46.239.97.229 129.231.237.216 36.71.71.95 151.165.66.254
189.27.129.215 193.180.93.70 136.87.2.167 182.70.191.200
125.54.17.225 54.189.145.221 44.4.74.24 0.39.54.180