Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kansas City

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.136.131.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;70.136.131.122.			IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120201 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 03 08:52:05 CST 2019
;; MSG SIZE  rcvd: 118
Host info
122.131.136.70.in-addr.arpa domain name pointer adsl-70-136-131-122.dsl.ksc2mo.swbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.131.136.70.in-addr.arpa	name = adsl-70-136-131-122.dsl.ksc2mo.swbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.248.240.178 attackbotsspam
Jul 17 11:38:41 rb06 sshd[27254]: Failed password for invalid user english from 104.248.240.178 port 56954 ssh2
Jul 17 11:38:41 rb06 sshd[27254]: Received disconnect from 104.248.240.178: 11: Bye Bye [preauth]
Jul 17 11:44:19 rb06 sshd[32378]: Failed password for invalid user parsa from 104.248.240.178 port 46462 ssh2
Jul 17 11:44:19 rb06 sshd[32378]: Received disconnect from 104.248.240.178: 11: Bye Bye [preauth]
Jul 17 11:48:40 rb06 sshd[464]: Failed password for invalid user wq from 104.248.240.178 port 48846 ssh2
Jul 17 11:48:40 rb06 sshd[464]: Received disconnect from 104.248.240.178: 11: Bye Bye [preauth]
Jul 17 11:52:52 rb06 sshd[1245]: Failed password for invalid user taiwan from 104.248.240.178 port 52522 ssh2
Jul 17 11:52:52 rb06 sshd[1245]: Received disconnect from 104.248.240.178: 11: Bye Bye [preauth]
Jul 17 11:57:14 rb06 sshd[2838]: Failed password for invalid user as from 104.248.240.178 port 54584 ssh2
Jul 17 11:57:14 rb06 sshd[2838]: Received disconnect........
-------------------------------
2019-07-20 12:31:17
85.99.105.156 attackbotsspam
Unauthorised access (Jul 20) SRC=85.99.105.156 LEN=44 TTL=49 ID=12095 TCP DPT=23 WINDOW=48703 SYN
2019-07-20 12:42:16
158.69.194.115 attack
Jul 20 06:25:14 SilenceServices sshd[24456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.194.115
Jul 20 06:25:17 SilenceServices sshd[24456]: Failed password for invalid user cashier from 158.69.194.115 port 51400 ssh2
Jul 20 06:31:34 SilenceServices sshd[29091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.194.115
2019-07-20 12:51:26
146.185.130.101 attack
Jul 20 00:05:16 TORMINT sshd\[27584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101  user=root
Jul 20 00:05:18 TORMINT sshd\[27584\]: Failed password for root from 146.185.130.101 port 51110 ssh2
Jul 20 00:09:48 TORMINT sshd\[28073\]: Invalid user fsp from 146.185.130.101
Jul 20 00:09:48 TORMINT sshd\[28073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101
...
2019-07-20 12:50:24
94.167.75.211 attackbots
''
2019-07-20 12:46:29
212.129.36.131 attackbots
Jul 20 03:33:00 esset sshd\[17546\]: refused connect from 212.129.36.131 \(212.129.36.131\)
Jul 20 03:33:00 esset sshd\[17548\]: refused connect from 212.129.36.131 \(212.129.36.131\)
2019-07-20 12:53:36
80.82.65.74 attack
20.07.2019 04:11:29 Connection to port 16347 blocked by firewall
2019-07-20 12:37:17
143.0.63.183 attack
Automatic report - Port Scan Attack
2019-07-20 12:58:23
165.227.150.158 attackbotsspam
Jul 20 04:57:38 meumeu sshd[29768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.150.158 
Jul 20 04:57:40 meumeu sshd[29768]: Failed password for invalid user admin from 165.227.150.158 port 53655 ssh2
Jul 20 05:02:12 meumeu sshd[30617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.150.158 
...
2019-07-20 13:12:44
218.23.156.227 attackbotsspam
Brute force attempt
2019-07-20 12:40:40
220.255.137.57 attackspam
Automatic report - Port Scan Attack
2019-07-20 13:14:26
136.144.156.43 attack
Jul 18 15:57:54 newdogma sshd[25797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.144.156.43  user=r.r
Jul 18 15:57:56 newdogma sshd[25797]: Failed password for r.r from 136.144.156.43 port 54224 ssh2
Jul 18 15:57:56 newdogma sshd[25797]: Received disconnect from 136.144.156.43 port 54224:11: Bye Bye [preauth]
Jul 18 15:57:56 newdogma sshd[25797]: Disconnected from 136.144.156.43 port 54224 [preauth]
Jul 18 16:05:47 newdogma sshd[25829]: Invalid user csgosrv from 136.144.156.43 port 36790
Jul 18 16:05:47 newdogma sshd[25829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.144.156.43
Jul 18 16:05:49 newdogma sshd[25829]: Failed password for invalid user csgosrv from 136.144.156.43 port 36790 ssh2
Jul 18 16:05:49 newdogma sshd[25829]: Received disconnect from 136.144.156.43 port 36790:11: Bye Bye [preauth]
Jul 18 16:05:49 newdogma sshd[25829]: Disconnected from 136.144.156.43 port........
-------------------------------
2019-07-20 12:45:58
185.207.232.232 attackspambots
Invalid user mongod from 185.207.232.232 port 44404
2019-07-20 12:59:36
106.13.105.77 attackbots
Jul 20 06:57:20 mail sshd\[20671\]: Invalid user tam from 106.13.105.77 port 49880
Jul 20 06:57:20 mail sshd\[20671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.77
Jul 20 06:57:22 mail sshd\[20671\]: Failed password for invalid user tam from 106.13.105.77 port 49880 ssh2
Jul 20 07:03:18 mail sshd\[21928\]: Invalid user uranus from 106.13.105.77 port 38470
Jul 20 07:03:18 mail sshd\[21928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.77
2019-07-20 13:11:28
123.125.71.92 attack
Automatic report - Banned IP Access
2019-07-20 12:39:40

Recently Reported IPs

154.193.25.126 53.207.149.102 85.140.50.178 130.118.213.230
62.5.226.222 145.92.163.230 162.38.238.84 179.46.63.220
60.159.142.225 176.167.26.47 153.252.79.29 44.198.98.177
214.216.105.220 96.11.251.173 155.203.161.139 221.15.233.149
180.178.255.38 222.131.92.29 109.162.104.94 86.93.201.54