Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Parlin

Region: New Jersey

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: MCI Communications Services, Inc. d/b/a Verizon Business

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.70.147.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28517
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;63.70.147.249.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 27 01:39:52 CST 2019
;; MSG SIZE  rcvd: 117
Host info
249.147.70.63.in-addr.arpa domain name pointer host249.mtf.org.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
249.147.70.63.in-addr.arpa	name = host249.mtf.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.65.150.85 attackbotsspam
Invalid user ggg from 159.65.150.85 port 58544
2019-08-11 14:34:34
107.170.195.246 attackbots
107.170.195.246 - - - [10/Aug/2019:22:18:14 +0000] "GET /manager/text/list HTTP/1.1" 404 162 "-" "Mozilla/5.0 zgrab/0.x" "-" "-"
2019-08-11 15:35:58
59.10.5.156 attackspam
Aug 11 00:51:47 xtremcommunity sshd\[16982\]: Invalid user log from 59.10.5.156 port 38220
Aug 11 00:51:47 xtremcommunity sshd\[16982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.5.156
Aug 11 00:51:49 xtremcommunity sshd\[16982\]: Failed password for invalid user log from 59.10.5.156 port 38220 ssh2
Aug 11 00:56:19 xtremcommunity sshd\[17089\]: Invalid user server from 59.10.5.156 port 55762
Aug 11 00:56:19 xtremcommunity sshd\[17089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.5.156
...
2019-08-11 15:16:36
89.234.157.254 attackspambots
port scan and connect, tcp 22 (ssh)
2019-08-11 15:28:54
111.255.12.129 attack
Telnetd brute force attack detected by fail2ban
2019-08-11 14:59:29
115.200.19.56 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-08-11 14:36:57
81.130.138.156 attack
$f2bV_matches
2019-08-11 14:42:38
89.248.160.193 attackbotsspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-08-11 14:45:52
71.205.166.111 attackspam
Aug 11 00:17:51 vserver sshd\[9661\]: Invalid user ubuntu from 71.205.166.111Aug 11 00:17:52 vserver sshd\[9661\]: Failed password for invalid user ubuntu from 71.205.166.111 port 47185 ssh2Aug 11 00:18:56 vserver sshd\[9663\]: Invalid user ubnt from 71.205.166.111Aug 11 00:18:58 vserver sshd\[9663\]: Failed password for invalid user ubnt from 71.205.166.111 port 47300 ssh2
...
2019-08-11 15:21:59
106.111.134.214 attackspambots
Aug 10 23:58:53 admin sendmail[6835]: x7ALwnwI006835: [106.111.134.214] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Aug 10 23:58:56 admin sendmail[6836]: x7ALwrW1006836: [106.111.134.214] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Aug 10 23:58:59 admin sendmail[6838]: x7ALwucM006838: [106.111.134.214] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Aug 10 23:59:03 admin sendmail[6842]: x7ALx0VK006842: [106.111.134.214] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.111.134.214
2019-08-11 15:08:46
92.91.60.249 attack
Aug 11 05:07:43 vps647732 sshd[19464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.91.60.249
Aug 11 05:07:44 vps647732 sshd[19464]: Failed password for invalid user test123 from 92.91.60.249 port 47173 ssh2
...
2019-08-11 14:33:34
207.244.79.145 attackbotsspam
2019-08-11 00:50:23 dovecot_login authenticator failed for (slG2n0P05) [207.244.79.145]:52867: 535 Incorrect authentication data (set_id=pandi)
2019-08-11 00:50:29 dovecot_login authenticator failed for (kPzqkGJHm) [207.244.79.145]:53119: 535 Incorrect authentication data (set_id=pandi)
2019-08-11 00:50:29 dovecot_login authenticator failed for (K2cO5I) [207.244.79.145]:53064: 535 Incorrect authentication data (set_id=ventspils)
2019-08-11 00:50:39 dovecot_login authenticator failed for (lSnAHjE) [207.244.79.145]:53532: 535 Incorrect authentication data (set_id=pandi)
2019-08-11 00:50:39 dovecot_login authenticator failed for (ynaC8S) [207.244.79.145]:53533: 535 Incorrect authentication data (set_id=ventspils)
2019-08-11 00:50:44 dovecot_login authenticator failed for (J9VN8hRRIH) [207.244.79.145]:53853: 535 Incorrect authentication data (set_id=lhostnamehuania)
2019-08-11 00:50:56 dovecot_login authenticator failed for (Pj4yQn) [207.244.79.145]:54209: 535 Incorrect auth........
------------------------------
2019-08-11 15:04:30
185.53.88.44 attackspam
08/10/2019-21:13:05.369278 185.53.88.44 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)
2019-08-11 14:44:52
172.16.160.61 attackspambots
firewall-block, port(s): 445/tcp
2019-08-11 14:30:59
185.175.93.78 attackbotsspam
08/11/2019-03:00:25.812447 185.175.93.78 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-11 15:41:03

Recently Reported IPs

67.132.120.101 96.23.3.141 63.33.4.166 167.135.208.61
61.23.41.215 188.177.101.70 208.145.205.40 94.140.243.223
115.223.178.221 180.215.29.56 113.165.0.218 210.146.22.117
147.216.244.66 124.23.105.215 152.195.82.24 18.110.35.213
178.45.33.250 147.134.25.80 46.62.97.60 77.123.75.129