Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.70.125.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26248
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;62.70.125.132.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050702 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 08 10:32:46 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 132.125.70.62.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 132.125.70.62.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
31.16.59.18 attack
Automatic report - Port Scan Attack
2020-04-03 00:58:46
62.234.91.204 attackspam
Triggered by Fail2Ban at Ares web server
2020-04-03 01:27:42
200.149.97.75 attack
Automatic report - Port Scan Attack
2020-04-03 01:33:25
222.186.52.39 attackspam
Apr  2 17:42:36 ip-172-31-61-156 sshd[32546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39  user=root
Apr  2 17:42:38 ip-172-31-61-156 sshd[32546]: Failed password for root from 222.186.52.39 port 10171 ssh2
...
2020-04-03 01:50:10
180.150.21.236 attack
Apr  2 18:32:23 ns382633 sshd\[19149\]: Invalid user zi from 180.150.21.236 port 57430
Apr  2 18:32:23 ns382633 sshd\[19149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.21.236
Apr  2 18:32:25 ns382633 sshd\[19149\]: Failed password for invalid user zi from 180.150.21.236 port 57430 ssh2
Apr  2 18:37:05 ns382633 sshd\[20041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.21.236  user=root
Apr  2 18:37:07 ns382633 sshd\[20041\]: Failed password for root from 180.150.21.236 port 35600 ssh2
2020-04-03 01:37:13
62.234.97.139 attack
Apr  2 15:07:52 legacy sshd[5758]: Failed password for root from 62.234.97.139 port 32866 ssh2
Apr  2 15:09:59 legacy sshd[5843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.97.139
Apr  2 15:10:00 legacy sshd[5843]: Failed password for invalid user smbread from 62.234.97.139 port 43378 ssh2
...
2020-04-03 01:00:40
106.75.100.18 attackspambots
Apr  2 14:36:11 vmd17057 sshd[12144]: Failed password for root from 106.75.100.18 port 41688 ssh2
...
2020-04-03 01:48:09
104.168.190.136 attackbotsspam
Apr  2 03:57:32 our-server-hostname postfix/smtpd[13963]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 03:57:34 our-server-hostname postfix/smtpd[13963]: disconnect from unknown[104.168.190.136]
Apr  2 03:57:35 our-server-hostname postfix/smtpd[14964]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 03:57:37 our-server-hostname postfix/smtpd[14964]: disconnect from unknown[104.168.190.136]
Apr  2 03:58:36 our-server-hostname postfix/smtpd[13963]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 03:58:38 our-server-hostname postfix/smtpd[13963]: disconnect from unknown[104.168.190.136]
Apr  2 03:58:43 our-server-hostname postfix/smtpd[15456]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 03:58:45 our-server-hostname postfix/smtpd[15456]: disconnect from unknown[104.168.190.136]
Apr  2 04:00:21 our-server-hostname postfix/smtpd[14964]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 04:00:23 our-server-hostname postfix/smtpd[14964]: disconnect........
-------------------------------
2020-04-03 01:48:39
37.59.98.64 attack
Apr  2 21:56:11 gw1 sshd[32284]: Failed password for root from 37.59.98.64 port 43892 ssh2
...
2020-04-03 01:13:44
195.54.167.17 attackspam
Port scan detected on ports: 59947[TCP], 59770[TCP], 59709[TCP]
2020-04-03 01:34:34
218.92.0.145 attackbotsspam
Apr  2 19:03:45 mail sshd\[25159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Apr  2 19:03:47 mail sshd\[25159\]: Failed password for root from 218.92.0.145 port 21353 ssh2
Apr  2 19:03:51 mail sshd\[25159\]: Failed password for root from 218.92.0.145 port 21353 ssh2
...
2020-04-03 01:05:26
60.15.251.155 attackspambots
CN_APNIC-HM_<177>1585831478 [1:2403388:56419] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 45 [Classification: Misc Attack] [Priority: 2]:  {TCP} 60.15.251.155:16490
2020-04-03 01:31:29
203.195.231.79 attackbotsspam
Invalid user news from 203.195.231.79 port 42700
2020-04-03 01:13:20
212.83.170.85 attackbots
Trying ports that it shouldn't be.
2020-04-03 01:36:51
141.135.215.125 attack
Apr  2 16:40:26 deb10 sshd[20829]: Invalid user pi from 141.135.215.125 port 32886
Apr  2 16:40:26 deb10 sshd[20833]: Invalid user pi from 141.135.215.125 port 32888
2020-04-03 01:14:59

Recently Reported IPs

190.96.23.236 193.112.94.153 191.34.162.186 199.249.230.118
192.169.190.2 1.193.160.164 96.22.246.142 90.187.178.163
177.139.167.7 74.82.47.46 77.247.109.50 217.112.169.209
46.101.130.104 178.118.78.75 134.175.191.248 167.114.24.178
124.228.83.59 120.203.8.179 105.148.93.67 239.157.188.252