Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.158.70.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.158.70.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 04:05:55 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 109.70.158.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.70.158.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.131.180.15 attack
May 12 06:18:38 NG-HHDC-SVS-001 sshd[14490]: Invalid user dasusr1 from 188.131.180.15
...
2020-05-12 04:25:57
111.229.99.69 attack
SSH Brute Force
2020-05-12 04:29:15
213.195.104.28 attackspam
Unauthorized connection attempt detected from IP address 213.195.104.28 to port 23
2020-05-12 04:17:22
78.90.74.3 attackspambots
BG - - [11/May/2020:03:49:14 +0300] GET / HTTP/1.0 302 - - -
2020-05-12 04:15:27
50.3.104.38 attack
TCP Port: 25      invalid blocked  zen-spamhaus also spam-sorbs and anonmails-de           (75)
2020-05-12 04:08:46
49.88.112.114 attackspambots
2020-05-12T04:43:02.517561vivaldi2.tree2.info sshd[20087]: refused connect from 49.88.112.114 (49.88.112.114)
2020-05-12T04:44:18.394438vivaldi2.tree2.info sshd[20109]: refused connect from 49.88.112.114 (49.88.112.114)
2020-05-12T04:45:35.453931vivaldi2.tree2.info sshd[20167]: refused connect from 49.88.112.114 (49.88.112.114)
2020-05-12T04:46:50.778019vivaldi2.tree2.info sshd[20208]: refused connect from 49.88.112.114 (49.88.112.114)
2020-05-12T04:48:10.321205vivaldi2.tree2.info sshd[20297]: refused connect from 49.88.112.114 (49.88.112.114)
...
2020-05-12 04:16:34
157.230.190.90 attackspam
May 11 17:26:21 home sshd[2777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.90
May 11 17:26:23 home sshd[2777]: Failed password for invalid user snadendla from 157.230.190.90 port 59806 ssh2
May 11 17:32:03 home sshd[3805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.90
...
2020-05-12 03:56:47
107.170.195.87 attack
*Port Scan* detected from 107.170.195.87 (US/United States/California/San Francisco/charles-creative.managed). 4 hits in the last 235 seconds
2020-05-12 04:35:18
27.105.124.207 attackspambots
Unauthorized connection attempt from IP address 27.105.124.207 on Port 445(SMB)
2020-05-12 04:02:25
72.240.156.134 attackbots
Unauthorized connection attempt detected from IP address 72.240.156.134 to port 85
2020-05-12 04:27:11
114.47.96.154 attack
Port probing on unauthorized port 23
2020-05-12 04:33:04
95.181.131.153 attack
May 11 22:10:36 Ubuntu-1404-trusty-64-minimal sshd\[14625\]: Invalid user sme from 95.181.131.153
May 11 22:10:36 Ubuntu-1404-trusty-64-minimal sshd\[14625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153
May 11 22:10:38 Ubuntu-1404-trusty-64-minimal sshd\[14625\]: Failed password for invalid user sme from 95.181.131.153 port 48354 ssh2
May 11 22:19:52 Ubuntu-1404-trusty-64-minimal sshd\[19127\]: Invalid user aeltie from 95.181.131.153
May 11 22:19:52 Ubuntu-1404-trusty-64-minimal sshd\[19127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153
2020-05-12 04:34:24
194.78.58.50 attackspam
Unauthorized connection attempt from IP address 194.78.58.50 on Port 445(SMB)
2020-05-12 04:26:26
185.112.33.149 attackbotsspam
xmlrpc attack
2020-05-12 04:03:37
220.88.1.208 attack
May 11 20:02:40 ip-172-31-61-156 sshd[24397]: Failed password for invalid user gb from 220.88.1.208 port 45135 ssh2
May 11 20:06:35 ip-172-31-61-156 sshd[24648]: Invalid user test from 220.88.1.208
May 11 20:06:35 ip-172-31-61-156 sshd[24648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.88.1.208
May 11 20:06:35 ip-172-31-61-156 sshd[24648]: Invalid user test from 220.88.1.208
May 11 20:06:37 ip-172-31-61-156 sshd[24648]: Failed password for invalid user test from 220.88.1.208 port 49349 ssh2
...
2020-05-12 04:21:35

Recently Reported IPs

181.170.220.70 179.103.26.89 221.48.201.126 131.11.100.21
16.166.241.40 245.76.219.47 232.142.235.191 52.58.117.65
206.184.142.243 92.150.194.219 222.182.229.42 99.41.116.140
84.233.148.163 60.77.237.110 246.232.194.218 109.189.51.21
5.119.62.188 146.252.106.113 199.160.252.249 48.204.36.177