Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.132.109.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.132.109.66.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:37:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
66.109.132.70.in-addr.arpa domain name pointer adsl-70-132-109-66.dsl.snfc21.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.109.132.70.in-addr.arpa	name = adsl-70-132-109-66.dsl.snfc21.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.20.134.136 attackbotsspam
Invalid user jacolmenares from 187.20.134.136 port 57492
2019-07-15 21:18:45
113.118.159.169 attack
Jul 15 11:45:37 yesfletchmain sshd\[6908\]: Invalid user sistemas2 from 113.118.159.169 port 45712
Jul 15 11:45:37 yesfletchmain sshd\[6908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.118.159.169
Jul 15 11:45:38 yesfletchmain sshd\[6908\]: Failed password for invalid user sistemas2 from 113.118.159.169 port 45712 ssh2
Jul 15 11:51:17 yesfletchmain sshd\[7043\]: Invalid user admin from 113.118.159.169 port 40360
Jul 15 11:51:17 yesfletchmain sshd\[7043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.118.159.169
...
2019-07-15 21:33:09
213.181.193.58 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07151032)
2019-07-15 21:21:06
103.102.142.154 attackspambots
Unauthorized access detected from banned ip
2019-07-15 20:52:04
191.53.253.189 attackspam
failed_logins
2019-07-15 21:00:45
14.187.36.45 attack
14.187.36.45 has been banned for [spam]
...
2019-07-15 21:31:29
100.8.128.151 attackbots
Automatic report - Port Scan Attack
2019-07-15 20:37:20
2a0b:7280:100:0:4d5:7cff:fe00:213b attackspam
WP Authentication failure
2019-07-15 20:58:32
165.231.85.222 attack
Unauthorized access detected from banned ip
2019-07-15 21:21:30
142.234.203.76 attackspambots
Unauthorized access detected from banned ip
2019-07-15 20:51:21
185.58.53.66 attackbotsspam
Jul 15 12:09:47 unicornsoft sshd\[24608\]: Invalid user htt from 185.58.53.66
Jul 15 12:09:47 unicornsoft sshd\[24608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.58.53.66
Jul 15 12:09:49 unicornsoft sshd\[24608\]: Failed password for invalid user htt from 185.58.53.66 port 50714 ssh2
2019-07-15 21:06:13
179.61.158.104 attack
Unauthorized access detected from banned ip
2019-07-15 21:19:05
77.232.106.221 attack
firewall-block, port(s): 2323/tcp
2019-07-15 21:38:21
45.236.74.59 attack
Jul 15 08:15:10 rigel postfix/smtpd[31991]: warning: hostname 45-236-74-59.meganet.com.br does not resolve to address 45.236.74.59: Name or service not known
Jul 15 08:15:10 rigel postfix/smtpd[31991]: connect from unknown[45.236.74.59]
Jul 15 08:15:14 rigel postfix/smtpd[31991]: warning: unknown[45.236.74.59]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 15 08:15:15 rigel postfix/smtpd[31991]: warning: unknown[45.236.74.59]: SASL PLAIN authentication failed: authentication failure
Jul 15 08:15:16 rigel postfix/smtpd[31991]: warning: unknown[45.236.74.59]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.236.74.59
2019-07-15 21:00:13
54.38.184.10 attackspam
Jul 15 11:00:56 cp sshd[10838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.10
2019-07-15 21:10:11

Recently Reported IPs

184.50.129.210 247.224.169.117 21.199.67.93 192.36.255.216
51.20.253.105 187.247.208.79 24.73.204.225 90.125.217.59
211.203.127.65 129.106.218.213 220.230.167.216 27.162.189.179
242.252.56.10 153.172.36.176 225.106.126.123 86.169.232.137
235.230.120.227 119.86.171.132 92.18.101.128 134.220.138.199