Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.70.63.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.70.63.106.			IN	A

;; AUTHORITY SECTION:
.			517	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061501 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 02:42:49 CST 2022
;; MSG SIZE  rcvd: 105
Host info
106.63.70.45.in-addr.arpa domain name pointer 106-63-70-45.turbonetelecom.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.63.70.45.in-addr.arpa	name = 106-63-70-45.turbonetelecom.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.115.120.57 attack
Postfix RBL failed
2020-05-26 15:16:30
203.90.16.223 attackspam
Automatic report - Banned IP Access
2020-05-26 14:46:56
140.143.245.30 attackspambots
May 25 19:47:52 php1 sshd\[18093\]: Invalid user pragmax from 140.143.245.30
May 25 19:47:52 php1 sshd\[18093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.245.30
May 25 19:47:54 php1 sshd\[18093\]: Failed password for invalid user pragmax from 140.143.245.30 port 36838 ssh2
May 25 19:51:39 php1 sshd\[18402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.245.30  user=root
May 25 19:51:41 php1 sshd\[18402\]: Failed password for root from 140.143.245.30 port 50776 ssh2
2020-05-26 15:13:55
167.71.102.186 attack
Port scan denied
2020-05-26 14:52:27
115.85.213.217 attackbotsspam
Rude login attack (8 tries in 1d)
2020-05-26 15:10:45
212.102.33.48 attackbotsspam
Hacking activity
2020-05-26 15:22:14
129.204.226.105 attack
Invalid user 3 from 129.204.226.105 port 37660
2020-05-26 15:22:58
1.11.201.18 attackspambots
$f2bV_matches
2020-05-26 14:45:17
196.52.43.98 attack
 TCP (SYN) 196.52.43.98:62682 -> port 139, len 44
2020-05-26 14:44:44
129.28.192.33 attack
$f2bV_matches
2020-05-26 14:44:12
178.62.254.165 attackspambots
05/25/2020-22:58:46.896592 178.62.254.165 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-26 15:19:36
138.121.120.91 attackbots
Failed password for invalid user guest from 138.121.120.91 port 37474 ssh2
2020-05-26 14:45:56
212.51.148.162 attack
May 25 19:11:45 eddieflores sshd\[9099\]: Invalid user jemmons from 212.51.148.162
May 25 19:11:45 eddieflores sshd\[9099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212-51-148-162.fiber7.init7.net
May 25 19:11:46 eddieflores sshd\[9099\]: Failed password for invalid user jemmons from 212.51.148.162 port 39468 ssh2
May 25 19:16:04 eddieflores sshd\[9468\]: Invalid user crick from 212.51.148.162
May 25 19:16:04 eddieflores sshd\[9468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212-51-148-162.fiber7.init7.net
2020-05-26 14:48:53
180.76.249.74 attackbotsspam
$f2bV_matches
2020-05-26 15:15:13
114.67.80.209 attackspam
$f2bV_matches
2020-05-26 14:43:17

Recently Reported IPs

45.57.167.31 45.57.156.222 0.53.69.87 45.70.63.88
45.70.193.94 45.57.159.16 45.57.159.18 45.70.94.133
45.70.106.70 137.226.248.235 45.57.160.134 45.163.173.30
23.236.198.114 35.190.190.33 38.132.233.101 131.100.137.183
49.85.97.114 49.85.98.241 49.85.97.249 49.85.98.184