Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '51.69.0.0 - 51.70.255.255'

% Abuse contact for '51.69.0.0 - 51.70.255.255' is 'trustandsafety@support.aws.com'

inetnum:        51.69.0.0 - 51.70.255.255
netname:        US-A100ROW-199300901
org:            ORG-ARI3-RIPE
descr:          A100 Row Inc
country:        DE
admin-c:        IM4726-RIPE
tech-c:         IM4726-RIPE
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-ADSI
created:        2026-04-20T09:59:18Z
last-modified:  2026-04-20T09:59:18Z
source:         RIPE

organisation:   ORG-ARI3-RIPE
org-name:       A100 ROW Inc
country:        US
org-type:       LIR
address:        Marcel-Breuer-Strasse 12
address:        80807
address:        Munchen
address:        GERMANY
phone:          +4994178878008
admin-c:        IM4726-RIPE
tech-c:         IM4726-RIPE
abuse-c:        AWSA3-RIPE
mnt-ref:        MNT-ADSI
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         MNT-ADSI
mnt-by:         RIPE-NCC-HM-MNT
created:        2015-12-08T10:45:00Z
last-modified:  2024-03-21T15:40:25Z
source:         RIPE # Filtered

person:         IP Man
address:        Marcel-Breuer-Strasse 12
address:        80807
address:        Munchen
address:        GERMANY
phone:          +4994178878008
nic-hdl:        IM4726-RIPE
mnt-by:         us-a100row-1-mnt
created:        2015-12-08T10:44:59Z
last-modified:  2015-12-08T10:45:00Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.70.254.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28615
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;51.70.254.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042802 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 11:06:07 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 132.254.70.51.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.254.70.51.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.234.120.114 attack
Invalid user criminal from 49.234.120.114 port 46048
2019-10-16 10:01:49
92.119.160.80 attackbotsspam
*Port Scan* detected from 92.119.160.80 (RU/Russia/-). 4 hits in the last 65 seconds
2019-10-16 10:29:09
129.204.123.216 attackspambots
Oct 15 21:43:39 DAAP sshd[27300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.123.216  user=root
Oct 15 21:43:41 DAAP sshd[27300]: Failed password for root from 129.204.123.216 port 51186 ssh2
Oct 15 21:48:25 DAAP sshd[27329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.123.216  user=root
Oct 15 21:48:27 DAAP sshd[27329]: Failed password for root from 129.204.123.216 port 34098 ssh2
...
2019-10-16 10:19:20
103.17.55.200 attackspambots
$f2bV_matches
2019-10-16 10:03:18
114.237.109.52 attack
Oct 15 22:49:11 elektron postfix/smtpd\[26370\]: NOQUEUE: reject: RCPT from unknown\[114.237.109.52\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.109.52\]\; from=\ to=\ proto=ESMTP helo=\
Oct 15 22:49:45 elektron postfix/smtpd\[28859\]: NOQUEUE: reject: RCPT from unknown\[114.237.109.52\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.109.52\]\; from=\ to=\ proto=ESMTP helo=\
Oct 15 22:50:19 elektron postfix/smtpd\[28859\]: NOQUEUE: reject: RCPT from unknown\[114.237.109.52\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.109.52\]\; from=\ to=\ proto=ESMTP helo=\
2019-10-16 09:58:03
162.243.10.64 attack
2019-10-15T16:12:11.052008ns525875 sshd\[28805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64  user=root
2019-10-15T16:12:13.610566ns525875 sshd\[28805\]: Failed password for root from 162.243.10.64 port 56386 ssh2
2019-10-15T16:15:49.869968ns525875 sshd\[939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64  user=root
2019-10-15T16:15:51.686639ns525875 sshd\[939\]: Failed password for root from 162.243.10.64 port 39400 ssh2
...
2019-10-16 10:29:54
185.104.185.39 attackspambots
Automatic report - XMLRPC Attack
2019-10-16 09:56:47
31.20.92.192 attackspambots
fraudulent SSH attempt
2019-10-16 10:21:25
176.107.133.97 attackbotsspam
Oct 16 03:21:24 ArkNodeAT sshd\[30844\]: Invalid user Kansas123 from 176.107.133.97
Oct 16 03:21:24 ArkNodeAT sshd\[30844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.107.133.97
Oct 16 03:21:26 ArkNodeAT sshd\[30844\]: Failed password for invalid user Kansas123 from 176.107.133.97 port 50452 ssh2
2019-10-16 10:01:03
198.27.69.176 attack
Automated report (2019-10-15T19:48:40+00:00). Non-escaped characters in POST detected (bot indicator).
2019-10-16 10:12:10
49.234.115.143 attack
Oct 15 15:57:51 hanapaa sshd\[27892\]: Invalid user passw0rd from 49.234.115.143
Oct 15 15:57:51 hanapaa sshd\[27892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.115.143
Oct 15 15:57:53 hanapaa sshd\[27892\]: Failed password for invalid user passw0rd from 49.234.115.143 port 50660 ssh2
Oct 15 16:02:02 hanapaa sshd\[28216\]: Invalid user P4ssw0rd1 from 49.234.115.143
Oct 15 16:02:02 hanapaa sshd\[28216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.115.143
2019-10-16 10:06:50
35.245.96.116 attackbots
fraudulent SSH attempt
2019-10-16 10:10:41
193.70.1.220 attackbotsspam
ssh failed login
2019-10-16 10:02:04
35.240.217.103 attack
Invalid user julian from 35.240.217.103 port 54742
2019-10-16 10:14:43
190.102.140.7 attackbots
Oct 16 02:04:59 ovpn sshd\[20736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.102.140.7  user=root
Oct 16 02:05:01 ovpn sshd\[20736\]: Failed password for root from 190.102.140.7 port 58886 ssh2
Oct 16 02:24:20 ovpn sshd\[24463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.102.140.7  user=root
Oct 16 02:24:21 ovpn sshd\[24463\]: Failed password for root from 190.102.140.7 port 37112 ssh2
Oct 16 02:28:35 ovpn sshd\[25311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.102.140.7  user=root
2019-10-16 09:58:56

Recently Reported IPs

2606:4700:10::6816:2616 225.42.196.103 109.246.137.246 0.217.25.133
221.11.223.216 139.178.131.176 66.132.186.184 2606:4700:10::6816:2179
2606:4700:10::6814:9014 2606:4700:10::6816:2401 124.239.224.7 106.75.232.108
5.133.192.175 36.88.180.115 141.193.158.42 55.55.234.192
82.38.204.2 142.248.80.30 109.186.243.200 87.71.124.147