Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Steuben

Region: Maine

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.16.195.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.16.195.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:24:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
244.195.16.70.in-addr.arpa domain name pointer 70-16-195-244.ptldme.fidium.ccidns.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.195.16.70.in-addr.arpa	name = 70-16-195-244.ptldme.fidium.ccidns.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
144.178.143.100 attackbotsspam
port scan and connect, tcp 8000 (http-alt)
2019-10-02 15:09:35
92.119.160.52 attack
10/02/2019-02:15:22.995743 92.119.160.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-02 15:15:33
189.148.220.21 attackbots
Automatic report - Port Scan Attack
2019-10-02 15:09:59
14.162.146.87 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 04:50:20.
2019-10-02 15:45:21
85.38.164.51 attackspam
2019-10-02T06:55:13.305655abusebot-8.cloudsearch.cf sshd\[12334\]: Invalid user nut from 85.38.164.51 port 41528
2019-10-02 15:03:56
114.67.70.94 attackspam
Oct  1 21:18:11 auw2 sshd\[11102\]: Invalid user xc from 114.67.70.94
Oct  1 21:18:11 auw2 sshd\[11102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.94
Oct  1 21:18:13 auw2 sshd\[11102\]: Failed password for invalid user xc from 114.67.70.94 port 34964 ssh2
Oct  1 21:23:19 auw2 sshd\[11544\]: Invalid user ye from 114.67.70.94
Oct  1 21:23:19 auw2 sshd\[11544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.94
2019-10-02 15:48:37
200.160.111.44 attack
Oct  2 01:44:31 TORMINT sshd\[10247\]: Invalid user steam from 200.160.111.44
Oct  2 01:44:31 TORMINT sshd\[10247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.111.44
Oct  2 01:44:32 TORMINT sshd\[10247\]: Failed password for invalid user steam from 200.160.111.44 port 19890 ssh2
...
2019-10-02 15:23:12
45.142.195.5 attackspam
Oct  2 09:08:56 webserver postfix/smtpd\[21161\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 09:09:43 webserver postfix/smtpd\[21161\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 09:10:32 webserver postfix/smtpd\[21161\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 09:11:18 webserver postfix/smtpd\[21161\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 09:12:05 webserver postfix/smtpd\[21381\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-02 15:15:53
51.91.36.28 attackspam
Oct  2 07:05:24 www sshd\[48073\]: Invalid user pas from 51.91.36.28Oct  2 07:05:26 www sshd\[48073\]: Failed password for invalid user pas from 51.91.36.28 port 42822 ssh2Oct  2 07:09:06 www sshd\[48151\]: Invalid user testa from 51.91.36.28
...
2019-10-02 15:47:07
89.207.92.172 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 04:50:28.
2019-10-02 15:33:03
140.249.35.66 attack
Oct  2 06:05:58 icinga sshd[56926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.35.66 
Oct  2 06:06:00 icinga sshd[56926]: Failed password for invalid user abbasciano from 140.249.35.66 port 54934 ssh2
Oct  2 06:28:49 icinga sshd[7222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.35.66 
...
2019-10-02 15:15:01
221.149.133.64 attackbotsspam
Fail2Ban - FTP Abuse Attempt
2019-10-02 15:40:53
66.96.237.85 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 04:50:27.
2019-10-02 15:33:23
182.72.162.2 attackspam
Oct  2 06:51:01 tux-35-217 sshd\[13831\]: Invalid user admin from 182.72.162.2 port 10000
Oct  2 06:51:01 tux-35-217 sshd\[13831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.162.2
Oct  2 06:51:03 tux-35-217 sshd\[13831\]: Failed password for invalid user admin from 182.72.162.2 port 10000 ssh2
Oct  2 06:55:01 tux-35-217 sshd\[13863\]: Invalid user gentry from 182.72.162.2 port 10000
Oct  2 06:55:01 tux-35-217 sshd\[13863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.162.2
...
2019-10-02 15:43:54
14.254.221.19 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 04:50:22.
2019-10-02 15:40:01

Recently Reported IPs

26.107.75.60 210.218.191.218 192.121.181.152 101.250.79.57
153.159.13.20 16.143.49.36 224.4.159.200 55.13.124.96
21.190.221.65 38.37.5.111 45.192.35.69 168.194.75.244
45.80.68.204 211.149.20.14 99.249.162.149 139.102.221.159
86.203.17.137 170.253.169.101 84.20.179.59 74.98.44.84