Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 231.13.70.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;231.13.70.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 01:25:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 42.70.13.231.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.70.13.231.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.138.150.220 attackspambots
05/20/2020-19:39:15.730311 219.138.150.220 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-21 07:53:23
107.170.99.119 attackspam
Invalid user chenjingyi from 107.170.99.119 port 50760
2020-05-21 07:32:14
106.12.190.177 attackspambots
Invalid user roi from 106.12.190.177 port 58080
2020-05-21 07:29:12
49.235.183.62 attackspam
Invalid user eck from 49.235.183.62 port 52338
2020-05-21 07:15:10
171.220.243.192 attackspambots
May 20 19:24:04 vps sshd[596186]: Failed password for invalid user siberest from 171.220.243.192 port 44400 ssh2
May 20 19:29:36 vps sshd[621185]: Invalid user jib from 171.220.243.192 port 48902
May 20 19:29:36 vps sshd[621185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.220.243.192
May 20 19:29:38 vps sshd[621185]: Failed password for invalid user jib from 171.220.243.192 port 48902 ssh2
May 20 19:35:08 vps sshd[650313]: Invalid user vck from 171.220.243.192 port 53406
...
2020-05-21 07:48:20
170.130.187.34 attack
20/5/20@13:28:57: FAIL: Alarm-Intrusion address from=170.130.187.34
...
2020-05-21 07:42:33
45.147.44.108 attackbotsspam
from aufderhar.williamhgrosscollection.com (aufderhar.williamhgrosscollection.com [45.147.44.108]) by cauvin.org with ESMTP ; Wed, 20 May 2020 10:53:27 -0500
2020-05-21 07:27:34
188.166.158.153 attackbots
Automatically reported by fail2ban report script (mx1)
2020-05-21 07:30:54
139.162.106.178 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-21 07:17:58
189.130.245.210 attackspambots
port
2020-05-21 07:18:43
123.206.64.77 attackspambots
May 20 23:52:53 inter-technics sshd[11779]: Invalid user apa from 123.206.64.77 port 34854
May 20 23:52:53 inter-technics sshd[11779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.64.77
May 20 23:52:53 inter-technics sshd[11779]: Invalid user apa from 123.206.64.77 port 34854
May 20 23:52:54 inter-technics sshd[11779]: Failed password for invalid user apa from 123.206.64.77 port 34854 ssh2
May 20 23:56:13 inter-technics sshd[12001]: Invalid user mpe from 123.206.64.77 port 53662
...
2020-05-21 07:38:19
45.80.65.82 attackbots
May 21 07:50:51 NG-HHDC-SVS-001 sshd[5177]: Invalid user wxmei from 45.80.65.82
...
2020-05-21 07:53:11
58.220.87.226 attack
Invalid user cwo from 58.220.87.226 port 51164
2020-05-21 07:16:15
51.15.56.133 attackbots
k+ssh-bruteforce
2020-05-21 07:28:51
120.92.80.120 attackspam
May 20 20:29:13 ws24vmsma01 sshd[102460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.80.120
May 20 20:29:15 ws24vmsma01 sshd[102460]: Failed password for invalid user hpctech from 120.92.80.120 port 52437 ssh2
...
2020-05-21 07:42:00

Recently Reported IPs

106.35.88.106 190.83.78.163 144.114.130.140 150.198.86.228
129.74.158.87 198.177.237.126 96.129.238.170 247.29.13.199
64.126.15.65 181.140.8.243 224.185.95.107 210.218.231.83
136.119.13.214 9.226.94.41 239.199.99.85 206.0.5.79
71.175.239.133 185.9.135.149 224.7.22.152 204.171.64.221