Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dongjak-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.142.70.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.142.70.215.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024091401 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 15 07:37:54 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 215.70.142.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.70.142.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.23.62.245 attackbots
failed_logins
2019-08-10 06:51:01
182.32.178.3 attackbotsspam
Unauthorized connection attempt from IP address 182.32.178.3 on Port 445(SMB)
2019-08-10 06:42:55
132.232.33.161 attack
Brute force SMTP login attempted.
...
2019-08-10 07:33:37
42.117.132.233 attackbotsspam
" "
2019-08-10 07:27:19
132.232.32.228 attack
Aug  9 21:18:35 vpn01 sshd\[22517\]: Invalid user richelle from 132.232.32.228
Aug  9 21:18:35 vpn01 sshd\[22517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228
Aug  9 21:18:37 vpn01 sshd\[22517\]: Failed password for invalid user richelle from 132.232.32.228 port 41304 ssh2
2019-08-10 07:34:19
218.62.122.35 attackbotsspam
Aug 10 01:30:26 localhost sshd[13309]: Invalid user zebra from 218.62.122.35 port 34940
Aug 10 01:30:26 localhost sshd[13309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.62.122.35
Aug 10 01:30:26 localhost sshd[13309]: Invalid user zebra from 218.62.122.35 port 34940
Aug 10 01:30:29 localhost sshd[13309]: Failed password for invalid user zebra from 218.62.122.35 port 34940 ssh2
...
2019-08-10 06:45:45
132.232.104.35 attackspam
Automatic report - Banned IP Access
2019-08-10 07:28:24
92.255.185.6 attackbots
Unauthorized connection attempt from IP address 92.255.185.6 on Port 25(SMTP)
2019-08-10 06:47:37
103.4.117.26 attackspambots
firewall-block, port(s): 80/tcp
2019-08-10 06:56:30
133.130.119.124 attackspam
Brute force SMTP login attempted.
...
2019-08-10 07:10:09
72.232.3.87 attackbotsspam
firewall-block, port(s): 445/tcp
2019-08-10 07:13:47
103.61.37.165 attackspambots
Aug  9 20:35:16 server sshd[12101]: Failed password for invalid user oracle from 103.61.37.165 port 64227 ssh2
Aug  9 20:48:22 server sshd[13260]: Failed password for invalid user vanessa from 103.61.37.165 port 38813 ssh2
Aug  9 20:53:12 server sshd[13664]: Failed password for invalid user raamatukogu from 103.61.37.165 port 25804 ssh2
2019-08-10 06:52:20
191.53.249.65 attackspambots
libpam_shield report: forced login attempt
2019-08-10 06:49:07
133.242.150.233 attackbotsspam
Brute force SMTP login attempted.
...
2019-08-10 07:04:01
176.212.223.156 attackbots
Automatic report - Port Scan Attack
2019-08-10 07:28:57

Recently Reported IPs

239.68.141.65 202.75.206.79 218.7.75.163 62.101.149.246
72.14.201.198 74.169.8.253 235.128.56.142 13.82.134.132
137.220.225.9 180.137.113.79 139.200.74.55 139.200.76.222
14.145.216.163 247.6.23.36 157.0.180.201 210.7.66.30
56.226.79.230 68.205.190.119 238.100.6.246 139.189.89.50