Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.139.195.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.139.195.51.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 04:55:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
51.195.139.70.in-addr.arpa domain name pointer 70-139-195-51.lightspeed.hstntx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.195.139.70.in-addr.arpa	name = 70-139-195-51.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.7.135.128 attack
Unauthorized connection attempt from IP address 61.7.135.128 on Port 445(SMB)
2020-02-10 03:39:28
182.23.0.35 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-10 03:59:16
218.92.0.138 attack
v+ssh-bruteforce
2020-02-10 03:40:14
186.249.234.10 attackspam
Feb  9 09:06:28 mockhub sshd[7006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.249.234.10
Feb  9 09:06:30 mockhub sshd[7006]: Failed password for invalid user veg from 186.249.234.10 port 43767 ssh2
...
2020-02-10 03:34:42
190.143.202.194 attackbotsspam
20/2/9@08:30:57: FAIL: Alarm-Network address from=190.143.202.194
20/2/9@08:30:57: FAIL: Alarm-Network address from=190.143.202.194
...
2020-02-10 03:43:47
113.182.108.205 attackspambots
Unauthorized connection attempt from IP address 113.182.108.205 on Port 445(SMB)
2020-02-10 04:03:01
203.177.39.178 attackspam
Unauthorized connection attempt from IP address 203.177.39.178 on Port 445(SMB)
2020-02-10 04:04:52
94.153.161.21 attackbotsspam
Unauthorized connection attempt from IP address 94.153.161.21 on Port 445(SMB)
2020-02-10 03:41:50
83.12.171.68 attackbotsspam
Automatic report - SSH Brute-Force Attack
2020-02-10 03:56:48
190.217.31.4 attackspam
Unauthorized connection attempt from IP address 190.217.31.4 on Port 445(SMB)
2020-02-10 03:52:45
148.102.53.178 attack
Unauthorized connection attempt from IP address 148.102.53.178 on Port 445(SMB)
2020-02-10 03:59:05
14.231.248.255 attackspambots
Unauthorized connection attempt from IP address 14.231.248.255 on Port 445(SMB)
2020-02-10 04:07:59
181.30.28.247 attackbotsspam
Feb  9 18:09:42 silence02 sshd[8634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.247
Feb  9 18:09:44 silence02 sshd[8634]: Failed password for invalid user jic from 181.30.28.247 port 56796 ssh2
Feb  9 18:13:40 silence02 sshd[10320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.247
2020-02-10 03:53:41
107.170.204.148 attackbots
Feb  9 04:14:10 hpm sshd\[18668\]: Invalid user ozk from 107.170.204.148
Feb  9 04:14:10 hpm sshd\[18668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.204.148
Feb  9 04:14:12 hpm sshd\[18668\]: Failed password for invalid user ozk from 107.170.204.148 port 39776 ssh2
Feb  9 04:17:18 hpm sshd\[19083\]: Invalid user udd from 107.170.204.148
Feb  9 04:17:18 hpm sshd\[19083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.204.148
2020-02-10 03:48:01
80.255.130.197 attack
Feb  9 19:52:59 main sshd[11506]: Failed password for invalid user ftu from 80.255.130.197 port 43114 ssh2
2020-02-10 04:07:38

Recently Reported IPs

87.100.48.229 43.61.122.29 52.119.188.130 100.64.104.32
79.140.252.68 85.27.27.69 25.68.10.152 250.200.186.80
33.59.81.113 152.225.53.170 248.228.142.231 76.195.32.136
25.196.75.236 127.229.148.54 251.124.237.43 249.155.82.49
88.140.81.209 148.186.169.201 200.53.129.144 19.44.103.76