Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanjing

Region: Jiangsu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.94.70.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.94.70.18.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121501 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 16 03:54:42 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 18.70.94.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.70.94.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.213.177 attackspam
2020-02-18T14:15:40.558034scmdmz1 sshd[9741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.213.177  user=root
2020-02-18T14:15:42.734480scmdmz1 sshd[9741]: Failed password for root from 106.13.213.177 port 60356 ssh2
2020-02-18T14:19:18.815295scmdmz1 sshd[10116]: Invalid user steam from 106.13.213.177 port 50480
2020-02-18T14:19:18.818176scmdmz1 sshd[10116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.213.177
2020-02-18T14:19:18.815295scmdmz1 sshd[10116]: Invalid user steam from 106.13.213.177 port 50480
2020-02-18T14:19:20.588259scmdmz1 sshd[10116]: Failed password for invalid user steam from 106.13.213.177 port 50480 ssh2
...
2020-02-19 05:04:00
5.237.142.122 attackspam
1582031981 - 02/18/2020 14:19:41 Host: 5.237.142.122/5.237.142.122 Port: 445 TCP Blocked
2020-02-19 04:52:43
182.61.48.209 attackspam
Feb 18 22:06:46 pornomens sshd\[1302\]: Invalid user hudson from 182.61.48.209 port 57762
Feb 18 22:06:46 pornomens sshd\[1302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.48.209
Feb 18 22:06:47 pornomens sshd\[1302\]: Failed password for invalid user hudson from 182.61.48.209 port 57762 ssh2
...
2020-02-19 05:16:08
101.51.69.240 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 05:09:23
101.64.156.51 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 04:55:43
134.209.178.109 attackbotsspam
Invalid user linux from 134.209.178.109 port 59168
2020-02-19 05:02:57
118.193.28.58 attack
Unauthorized connection attempt from IP address 118.193.28.58 on Port 3306(MYSQL)
2020-02-19 04:49:00
104.131.189.116 attackspam
(sshd) Failed SSH login from 104.131.189.116 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 18 20:20:58 ubnt-55d23 sshd[10783]: Invalid user gitlab-runner from 104.131.189.116 port 50722
Feb 18 20:21:00 ubnt-55d23 sshd[10783]: Failed password for invalid user gitlab-runner from 104.131.189.116 port 50722 ssh2
2020-02-19 05:11:56
178.235.117.44 attack
GET /wp-login.php
2020-02-19 05:22:47
132.232.81.207 attackbots
Feb 18 16:54:08 prox sshd[10679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.81.207 
Feb 18 16:54:10 prox sshd[10679]: Failed password for invalid user dale from 132.232.81.207 port 49988 ssh2
2020-02-19 05:02:05
217.61.5.234 attack
http://harbaugh.xyz/r.php?t=c&d=20762&l=328&c=27331
http://harbaugh.xyz/r.php?t=c&d=20762&l=249&c=14481
2020-02-19 05:20:41
101.65.116.217 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 04:54:29
37.32.41.184 attack
Automatic report - Port Scan Attack
2020-02-19 04:58:35
103.28.22.158 attack
2020-02-18T20:39:22.191028centos sshd\[16051\]: Invalid user uucp from 103.28.22.158 port 60834
2020-02-18T20:39:22.196045centos sshd\[16051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.22.158
2020-02-18T20:39:24.222617centos sshd\[16051\]: Failed password for invalid user uucp from 103.28.22.158 port 60834 ssh2
2020-02-19 05:23:17
162.243.128.25 attackspam
Port 2323 (Mirai botnet) access denied
2020-02-19 05:00:59

Recently Reported IPs

46.23.144.248 146.164.37.155 79.7.246.21 77.248.130.143
212.117.19.215 109.68.226.124 212.125.12.213 124.144.5.115
179.181.139.104 208.237.243.17 80.80.99.213 5.254.46.18
99.5.242.103 37.214.213.142 81.40.119.90 165.59.180.43
93.226.123.88 186.43.87.2 45.181.235.13 142.20.65.249