Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Birmingham

Region: Alabama

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.100.70.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;44.100.70.12.			IN	A

;; AUTHORITY SECTION:
.			431	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050103 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 12:43:33 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 12.70.100.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.70.100.44.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
149.129.242.80 attackspambots
Sep  8 01:56:31 SilenceServices sshd[7721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.242.80
Sep  8 01:56:33 SilenceServices sshd[7721]: Failed password for invalid user www-upload from 149.129.242.80 port 38856 ssh2
Sep  8 02:01:21 SilenceServices sshd[10368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.242.80
2019-09-08 12:58:49
47.63.130.181 attackspambots
Autoban   47.63.130.181 AUTH/CONNECT
2019-09-08 13:08:29
46.101.142.99 attackspam
$f2bV_matches
2019-09-08 12:35:30
195.209.45.122 attackbotsspam
[portscan] Port scan
2019-09-08 13:08:59
113.69.130.69 attack
Sep  8 00:50:08 mail postfix/smtpd[31514]: warning: unknown[113.69.130.69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 00:50:16 mail postfix/smtpd[31514]: warning: unknown[113.69.130.69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 00:50:29 mail postfix/smtpd[31514]: warning: unknown[113.69.130.69]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-08 13:10:22
118.24.101.182 attackbotsspam
Sep  8 01:48:00 ubuntu-2gb-nbg1-dc3-1 sshd[15200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.101.182
Sep  8 01:48:01 ubuntu-2gb-nbg1-dc3-1 sshd[15200]: Failed password for invalid user support from 118.24.101.182 port 56680 ssh2
...
2019-09-08 13:14:44
94.42.178.137 attack
Sep  7 21:38:25 web8 sshd\[29832\]: Invalid user passwd from 94.42.178.137
Sep  7 21:38:25 web8 sshd\[29832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.42.178.137
Sep  7 21:38:27 web8 sshd\[29832\]: Failed password for invalid user passwd from 94.42.178.137 port 44580 ssh2
Sep  7 21:44:06 web8 sshd\[32559\]: Invalid user 12 from 94.42.178.137
Sep  7 21:44:06 web8 sshd\[32559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.42.178.137
2019-09-08 13:16:17
185.101.105.229 attack
Sep  7 10:33:22 foo sshd[18166]: Invalid user ubnt from 185.101.105.229
Sep  7 10:33:22 foo sshd[18166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.101.105.229 
Sep  7 10:33:24 foo sshd[18166]: Failed password for invalid user ubnt from 185.101.105.229 port 57512 ssh2
Sep  7 10:33:24 foo sshd[18166]: Received disconnect from 185.101.105.229: 11: Bye Bye [preauth]
Sep  7 10:33:25 foo sshd[18168]: Invalid user admin from 185.101.105.229
Sep  7 10:33:25 foo sshd[18168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.101.105.229 
Sep  7 10:33:27 foo sshd[18168]: Failed password for invalid user admin from 185.101.105.229 port 59798 ssh2
Sep  7 10:33:27 foo sshd[18168]: Received disconnect from 185.101.105.229: 11: Bye Bye [preauth]
Sep  7 10:33:28 foo sshd[18170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.101.105.229  user=r.r
Sep  ........
-------------------------------
2019-09-08 12:59:15
103.207.11.10 attackspambots
Sep  7 17:44:53 TORMINT sshd\[27247\]: Invalid user sinusbot from 103.207.11.10
Sep  7 17:44:53 TORMINT sshd\[27247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.10
Sep  7 17:44:54 TORMINT sshd\[27247\]: Failed password for invalid user sinusbot from 103.207.11.10 port 48148 ssh2
...
2019-09-08 12:38:52
190.210.42.209 attack
Sep  8 06:26:27 bouncer sshd\[30324\]: Invalid user nagios from 190.210.42.209 port 54401
Sep  8 06:26:27 bouncer sshd\[30324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209 
Sep  8 06:26:29 bouncer sshd\[30324\]: Failed password for invalid user nagios from 190.210.42.209 port 54401 ssh2
...
2019-09-08 12:45:53
50.64.152.76 attack
2019-09-08T03:43:08.517391abusebot-8.cloudsearch.cf sshd\[7356\]: Invalid user danielle from 50.64.152.76 port 56792
2019-09-08 13:41:50
198.23.251.111 attackspambots
Sep  8 04:58:42 www_kotimaassa_fi sshd[30573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.251.111
Sep  8 04:58:44 www_kotimaassa_fi sshd[30573]: Failed password for invalid user gitpass from 198.23.251.111 port 37174 ssh2
...
2019-09-08 13:04:43
185.77.248.6 attackbotsspam
/login.php
2019-09-08 12:40:39
92.222.75.72 attack
Sep  8 01:03:14 ns41 sshd[28654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.72
Sep  8 01:03:14 ns41 sshd[28654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.72
2019-09-08 12:45:17
106.13.127.210 attackspambots
Sep  7 19:47:03 xtremcommunity sshd\[58167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.210  user=root
Sep  7 19:47:05 xtremcommunity sshd\[58167\]: Failed password for root from 106.13.127.210 port 55666 ssh2
Sep  7 19:55:53 xtremcommunity sshd\[58506\]: Invalid user xbmc from 106.13.127.210 port 58866
Sep  7 19:55:53 xtremcommunity sshd\[58506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.210
Sep  7 19:55:55 xtremcommunity sshd\[58506\]: Failed password for invalid user xbmc from 106.13.127.210 port 58866 ssh2
...
2019-09-08 13:23:17

Recently Reported IPs

174.27.250.181 2.238.81.90 206.94.244.143 5.233.76.159
216.38.74.169 73.138.96.20 18.161.6.53 22.70.61.33
228.185.101.242 138.127.253.101 236.73.240.56 125.30.102.85
156.160.107.120 135.82.37.159 125.165.33.76 229.171.13.79
160.153.146.73 67.143.7.84 65.201.49.129 135.226.10.54