Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.9.149.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.9.149.70.			IN	A

;; AUTHORITY SECTION:
.			469	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100200 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 03 00:41:03 CST 2023
;; MSG SIZE  rcvd: 104
Host info
b'Host 70.149.9.33.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 33.9.149.70.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
92.63.196.6 attackspam
Scanned 237 unique addresses for 4933 unique ports in 24 hours
2020-06-06 09:07:18
94.102.51.95 attackbots
06/05/2020-21:02:52.991252 94.102.51.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-06 09:05:15
141.98.81.6 attackbots
Jun  6 02:57:23 vps639187 sshd\[4316\]: Invalid user admin from 141.98.81.6 port 19862
Jun  6 02:57:23 vps639187 sshd\[4316\]: Failed none for invalid user admin from 141.98.81.6 port 19862 ssh2
Jun  6 02:57:23 vps639187 sshd\[4318\]: Invalid user user from 141.98.81.6 port 31916
Jun  6 02:57:23 vps639187 sshd\[4318\]: Failed none for invalid user user from 141.98.81.6 port 31916 ssh2
Jun  6 02:57:23 vps639187 sshd\[4320\]: Invalid user admin from 141.98.81.6 port 38828
Jun  6 02:57:23 vps639187 sshd\[4320\]: Failed none for invalid user admin from 141.98.81.6 port 38828 ssh2
...
2020-06-06 09:01:20
79.124.62.86 attack
Scanned 332 unique addresses for 102 unique ports in 24 hours
2020-06-06 09:12:12
195.54.160.29 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 13389 proto: TCP cat: Misc Attack
2020-06-06 08:57:26
58.132.209.210 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 4004 proto: TCP cat: Misc Attack
2020-06-06 09:15:31
45.134.179.102 attack
Scanned 237 unique addresses for 227 unique ports in 24 hours
2020-06-06 09:19:24
109.195.197.168 attackspam
Honeypot attack, port: 445, PTR: dynamicip-109-195-197-168.pppoe.ulsk.ertelecom.ru.
2020-06-06 09:28:43
171.100.68.150 attackspambots
Invalid user admin from 171.100.68.150 port 52267
2020-06-06 09:33:34
94.102.56.215 attack
firewall-block, port(s): 41083/udp, 41087/udp
2020-06-06 09:04:56
160.202.34.253 attackbotsspam
Jun  5 18:29:34 ny01 sshd[2659]: Failed password for root from 160.202.34.253 port 59996 ssh2
Jun  5 18:33:31 ny01 sshd[3196]: Failed password for root from 160.202.34.253 port 35554 ssh2
2020-06-06 09:24:00
195.54.160.105 attack
06/05/2020-17:34:16.385168 195.54.160.105 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-06 08:55:51
92.118.161.37 attackbots
 TCP (SYN) 92.118.161.37:59170 -> port 1443, len 44
2020-06-06 09:06:39
80.82.64.146 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 75 - port: 5901 proto: TCP cat: Misc Attack
2020-06-06 09:11:47
45.143.220.246 attack
port scan and connect, tcp 23 (telnet)
2020-06-06 09:19:06

Recently Reported IPs

251.43.178.92 167.21.26.71 147.61.138.204 53.74.15.20
183.29.246.125 186.66.138.173 174.113.41.150 107.127.90.39
18.121.53.170 154.106.49.59 67.70.23.17 10.3.119.180
107.241.155.105 83.10.207.45 231.40.8.180 220.224.70.33
123.200.249.141 33.254.83.161 132.245.245.37 9.39.56.52