Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.80.70.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.80.70.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 18:18:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 144.70.80.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.70.80.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.70.130.152 attackbotsspam
2019-12-29T08:08:47.972904shield sshd\[2159\]: Invalid user manto from 66.70.130.152 port 36700
2019-12-29T08:08:47.978184shield sshd\[2159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip152.ip-66-70-130.net
2019-12-29T08:08:50.403397shield sshd\[2159\]: Failed password for invalid user manto from 66.70.130.152 port 36700 ssh2
2019-12-29T08:11:19.058299shield sshd\[2786\]: Invalid user 123456789 from 66.70.130.152 port 32824
2019-12-29T08:11:19.062545shield sshd\[2786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip152.ip-66-70-130.net
2019-12-29 17:17:28
73.42.62.181 attackspambots
Unauthorized connection attempt detected from IP address 73.42.62.181 to port 5555
2019-12-29 17:44:30
201.170.106.253 attackspam
Unauthorized connection attempt detected from IP address 201.170.106.253 to port 81
2019-12-29 17:52:54
5.53.40.125 attackbotsspam
Unauthorized connection attempt detected from IP address 5.53.40.125 to port 9000
2019-12-29 17:23:13
167.99.202.143 attackbotsspam
Unauthorized connection attempt detected from IP address 167.99.202.143 to port 22
2019-12-29 17:33:56
80.174.87.215 attackbots
Unauthorized connection attempt detected from IP address 80.174.87.215 to port 23
2019-12-29 17:14:27
54.193.45.121 attackbotsspam
Unauthorized connection attempt detected from IP address 54.193.45.121 to port 5000
2019-12-29 17:45:54
73.245.127.219 attackbots
Unauthorized connection attempt detected from IP address 73.245.127.219 to port 23
2019-12-29 17:16:26
222.119.234.189 attackbots
Unauthorized connection attempt detected from IP address 222.119.234.189 to port 5555
2019-12-29 17:23:37
35.161.160.155 attack
Unauthorized connection attempt detected from IP address 35.161.160.155 to port 5000
2019-12-29 17:21:55
37.55.83.243 attackspam
Unauthorized connection attempt detected from IP address 37.55.83.243 to port 23
2019-12-29 17:21:17
50.203.130.2 attackbotsspam
Unauthorized connection attempt detected from IP address 50.203.130.2 to port 88
2019-12-29 17:19:35
109.199.132.110 attack
Unauthorized connection attempt detected from IP address 109.199.132.110 to port 8081
2019-12-29 17:36:01
125.64.94.211 attackspam
125.64.94.211 was recorded 5 times by 4 hosts attempting to connect to the following ports: 5984,9200,28017,27017. Incident counter (4h, 24h, all-time): 5, 35, 9509
2019-12-29 17:35:14
190.98.37.200 attackbotsspam
Unauthorized connection attempt detected from IP address 190.98.37.200 to port 23
2019-12-29 17:28:00

Recently Reported IPs

15.84.42.234 179.113.119.45 178.52.162.220 56.19.50.110
9.41.185.79 96.109.40.224 241.169.181.225 83.6.109.108
194.13.227.46 85.121.178.189 198.48.185.58 47.133.151.30
191.179.163.97 117.141.24.48 75.121.51.68 7.243.156.90
215.114.228.153 73.89.110.244 124.229.207.81 175.82.152.26