Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.31.27.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.31.27.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 13:03:21 CST 2025
;; MSG SIZE  rcvd: 104
Host info
70.27.31.45.in-addr.arpa domain name pointer 45-31-27-70.lightspeed.frsnca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.27.31.45.in-addr.arpa	name = 45-31-27-70.lightspeed.frsnca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.69.73.10 attackspambots
Automatically reported by fail2ban report script (mx1)
2020-04-01 16:22:04
106.54.93.137 attackbots
port scan and connect, tcp 6379 (redis)
2020-04-01 16:53:25
61.14.210.88 attackspambots
$f2bV_matches
2020-04-01 16:12:59
207.154.218.16 attack
Invalid user qub from 207.154.218.16 port 52522
2020-04-01 16:05:34
220.78.28.68 attackbots
Invalid user njs from 220.78.28.68 port 52243
2020-04-01 16:54:54
89.32.251.144 attackspam
Wordpress_xmlrpc_attack
2020-04-01 16:10:57
46.61.235.111 attackspam
$f2bV_matches
2020-04-01 16:06:40
171.224.118.212 attackbots
Unauthorised access (Apr  1) SRC=171.224.118.212 LEN=52 TTL=109 ID=7156 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-01 16:24:28
222.99.52.216 attackbotsspam
Invalid user fm from 222.99.52.216 port 25098
2020-04-01 16:09:15
211.25.119.131 attackspam
Apr  1 09:44:41 Ubuntu-1404-trusty-64-minimal sshd\[16606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.25.119.131  user=root
Apr  1 09:44:44 Ubuntu-1404-trusty-64-minimal sshd\[16606\]: Failed password for root from 211.25.119.131 port 49040 ssh2
Apr  1 10:06:38 Ubuntu-1404-trusty-64-minimal sshd\[1523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.25.119.131  user=root
Apr  1 10:06:40 Ubuntu-1404-trusty-64-minimal sshd\[1523\]: Failed password for root from 211.25.119.131 port 57753 ssh2
Apr  1 10:11:42 Ubuntu-1404-trusty-64-minimal sshd\[4877\]: Invalid user nw from 211.25.119.131
Apr  1 10:11:42 Ubuntu-1404-trusty-64-minimal sshd\[4877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.25.119.131
2020-04-01 16:30:41
45.64.126.103 attackspambots
SSH brute-force attempt
2020-04-01 16:27:11
106.54.19.67 attackbots
Invalid user rle from 106.54.19.67 port 60646
2020-04-01 16:41:22
39.152.34.31 attack
(eximsyntax) Exim syntax errors from 39.152.34.31 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-01 08:20:28 SMTP call from [39.152.34.31] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-04-01 16:45:50
114.234.183.147 attackspam
SpamScore above: 10.0
2020-04-01 16:08:29
94.23.203.37 attackspam
Apr  1 13:37:25 gw1 sshd[2817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.203.37
Apr  1 13:37:27 gw1 sshd[2817]: Failed password for invalid user 123456 from 94.23.203.37 port 57008 ssh2
...
2020-04-01 16:54:33

Recently Reported IPs

32.4.105.243 174.195.41.49 204.24.93.101 4.93.56.214
175.160.165.188 216.23.229.145 202.225.254.107 176.35.157.162
198.174.175.144 132.203.92.209 160.196.181.62 186.167.17.219
150.232.151.16 8.99.226.43 125.155.194.205 95.162.231.119
203.250.56.43 126.124.28.143 41.250.236.118 187.76.79.215