Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.132.122.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57210
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;70.132.122.29.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 20:06:11 CST 2019
;; MSG SIZE  rcvd: 117

Host info
29.122.132.70.in-addr.arpa domain name pointer adsl-70-132-122-29.dsl.snfc21.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
29.122.132.70.in-addr.arpa	name = adsl-70-132-122-29.dsl.snfc21.sbcglobal.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
83.97.20.232 attackbots
" "
2020-03-10 20:32:06
175.207.50.27 attackbotsspam
Automatic report - Port Scan Attack
2020-03-10 19:58:27
222.186.180.147 attackbotsspam
Mar1012:55:26server6sshd[9721]:refusedconnectfrom222.186.180.147\(222.186.180.147\)Mar1012:55:26server6sshd[9722]:refusedconnectfrom222.186.180.147\(222.186.180.147\)Mar1012:55:27server6sshd[9723]:refusedconnectfrom222.186.180.147\(222.186.180.147\)Mar1013:06:06server6sshd[10999]:refusedconnectfrom222.186.180.147\(222.186.180.147\)Mar1013:06:06server6sshd[11000]:refusedconnectfrom222.186.180.147\(222.186.180.147\)
2020-03-10 20:10:22
185.176.27.54 attack
03/10/2020-07:01:06.707497 185.176.27.54 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-10 20:01:47
1.53.250.136 attackspambots
Automatic report - Port Scan Attack
2020-03-10 20:29:47
171.251.236.210 attackbots
03/10/2020-05:25:20.699017 171.251.236.210 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-03-10 19:58:41
51.75.246.191 attackbots
IP blocked
2020-03-10 19:55:51
198.12.152.136 attackspambots
Brute forcing email accounts
2020-03-10 20:34:58
68.183.85.75 attackspambots
Mar 10 06:25:04 vps46666688 sshd[9951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.85.75
Mar 10 06:25:06 vps46666688 sshd[9951]: Failed password for invalid user qwerty from 68.183.85.75 port 38840 ssh2
...
2020-03-10 20:05:09
190.94.18.2 attackbotsspam
2020-03-09 UTC: (30x) - 123456,R00tAdmin1,ai-tsung,artem123,co,hadoop,robi,root(18x),rootaron,test123,testnet,user2,www1
2020-03-10 20:09:09
158.69.80.71 attack
DATE:2020-03-10 10:24:29, IP:158.69.80.71, PORT:ssh SSH brute force auth (docker-dc)
2020-03-10 20:31:35
39.82.235.80 attackspambots
$f2bV_matches
2020-03-10 20:25:15
74.82.47.5 attackbots
firewall-block, port(s): 17/udp
2020-03-10 20:32:43
14.163.251.77 attack
1583832291 - 03/10/2020 10:24:51 Host: 14.163.251.77/14.163.251.77 Port: 445 TCP Blocked
2020-03-10 20:16:24
201.52.32.249 attack
Mar 10 17:01:15 gw1 sshd[27959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.52.32.249
Mar 10 17:01:17 gw1 sshd[27959]: Failed password for invalid user postgres from 201.52.32.249 port 34454 ssh2
...
2020-03-10 20:15:59

Recently Reported IPs

207.133.139.33 104.236.123.248 131.167.133.219 92.185.71.150
192.216.122.175 113.186.250.188 209.48.111.165 12.168.117.66
151.140.194.7 121.198.168.179 103.11.69.75 76.141.139.236
177.138.75.135 61.206.69.129 137.240.150.23 132.119.64.217
180.254.236.75 169.44.42.15 34.73.176.13 86.79.124.254