Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.140.35.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.140.35.14.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 12:17:01 CST 2025
;; MSG SIZE  rcvd: 105
Host info
14.35.140.70.in-addr.arpa domain name pointer 70-140-35-14.lightspeed.hstntx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.35.140.70.in-addr.arpa	name = 70-140-35-14.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.81.157.220 attackbots
WordPress vulnerability sniffing (looking for /wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php)
2020-09-07 03:27:15
122.51.204.45 attackspambots
Time:     Sun Sep  6 13:17:04 2020 +0200
IP:       122.51.204.45 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  6 13:04:06 mail-01 sshd[18302]: Invalid user keywan from 122.51.204.45 port 17868
Sep  6 13:04:08 mail-01 sshd[18302]: Failed password for invalid user keywan from 122.51.204.45 port 17868 ssh2
Sep  6 13:09:14 mail-01 sshd[18531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.204.45  user=root
Sep  6 13:09:16 mail-01 sshd[18531]: Failed password for root from 122.51.204.45 port 39118 ssh2
Sep  6 13:17:00 mail-01 sshd[18843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.204.45  user=root
2020-09-07 03:29:30
106.12.33.78 attackbots
" "
2020-09-07 03:20:48
218.92.0.171 attackbots
Sep  6 19:07:20 rush sshd[23755]: Failed password for root from 218.92.0.171 port 15007 ssh2
Sep  6 19:07:23 rush sshd[23755]: Failed password for root from 218.92.0.171 port 15007 ssh2
Sep  6 19:07:27 rush sshd[23755]: Failed password for root from 218.92.0.171 port 15007 ssh2
Sep  6 19:07:30 rush sshd[23755]: Failed password for root from 218.92.0.171 port 15007 ssh2
...
2020-09-07 03:45:57
223.19.28.96 attack
Honeypot attack, port: 5555, PTR: 96-28-19-223-on-nets.com.
2020-09-07 03:33:00
45.148.9.198 attackbotsspam
email spam
2020-09-07 03:30:14
107.172.198.146 attack
SSH login attempts.
2020-09-07 03:11:11
178.35.149.230 attackspambots
Automatic report - Banned IP Access
2020-09-07 03:27:59
88.214.26.92 attackbotsspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-06T19:34:30Z
2020-09-07 03:35:43
187.189.241.135 attackspam
Sep  6 09:15:12 markkoudstaal sshd[21088]: Failed password for root from 187.189.241.135 port 38579 ssh2
Sep  6 09:18:41 markkoudstaal sshd[22047]: Failed password for root from 187.189.241.135 port 29018 ssh2
Sep  6 09:22:21 markkoudstaal sshd[23044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.241.135
...
2020-09-07 03:46:27
189.69.118.118 attackbotsspam
*Port Scan* detected from 189.69.118.118 (BR/Brazil/São Paulo/São Paulo/189-69-118-118.dsl.telesp.net.br). 4 hits in the last 10 seconds
2020-09-07 03:34:16
85.174.198.60 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 03:40:59
153.193.197.215 attack
Sep  5 05:07:41 km20725 sshd[15925]: Invalid user wanglj from 153.193.197.215 port 55424
Sep  5 05:07:41 km20725 sshd[15925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.193.197.215 
Sep  5 05:07:43 km20725 sshd[15925]: Failed password for invalid user wanglj from 153.193.197.215 port 55424 ssh2
Sep  5 05:07:45 km20725 sshd[15925]: Received disconnect from 153.193.197.215 port 55424:11: Bye Bye [preauth]
Sep  5 05:07:45 km20725 sshd[15925]: Disconnected from invalid user wanglj 153.193.197.215 port 55424 [preauth]
Sep  5 05:23:57 km20725 sshd[17081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.193.197.215  user=r.r
Sep  5 05:23:59 km20725 sshd[17081]: Failed password for r.r from 153.193.197.215 port 61947 ssh2
Sep  5 05:24:01 km20725 sshd[17081]: Received disconnect from 153.193.197.215 port 61947:11: Bye Bye [preauth]
Sep  5 05:24:01 km20725 sshd[17081]: Disconnected from a........
-------------------------------
2020-09-07 03:25:29
51.222.30.119 attackbotsspam
Sep  6 14:28:37 dev0-dcde-rnet sshd[7781]: Failed password for root from 51.222.30.119 port 59572 ssh2
Sep  6 14:32:15 dev0-dcde-rnet sshd[7811]: Failed password for root from 51.222.30.119 port 36554 ssh2
2020-09-07 03:13:28
2604:a880:cad:d0::54f:c001 attack
[-]:80 2604:a880:cad:d0::54f:c001 - - [05/Sep/2020:18:42:36 +0200] "GET /wp-login.php HTTP/1.1" 301 456 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-07 03:26:31

Recently Reported IPs

216.187.21.224 163.241.48.251 21.222.171.38 144.8.139.151
44.219.117.176 126.114.8.203 67.195.23.46 125.239.67.128
125.196.68.141 218.55.186.70 147.221.44.200 123.23.229.228
6.206.226.82 18.22.83.218 115.13.139.8 129.214.84.133
128.12.54.84 89.32.232.165 28.99.254.101 219.106.184.94