Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.196.45.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50735
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.196.45.18.			IN	A

;; AUTHORITY SECTION:
.			260	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 09:43:42 CST 2022
;; MSG SIZE  rcvd: 105
Host info
18.45.196.70.in-addr.arpa domain name pointer 18.sub-70-196-45.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.45.196.70.in-addr.arpa	name = 18.sub-70-196-45.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.154 attackspambots
2020-08-29T00:31:01.585897vps751288.ovh.net sshd\[25712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2020-08-29T00:31:03.140417vps751288.ovh.net sshd\[25712\]: Failed password for root from 222.186.173.154 port 51976 ssh2
2020-08-29T00:31:06.329262vps751288.ovh.net sshd\[25712\]: Failed password for root from 222.186.173.154 port 51976 ssh2
2020-08-29T00:31:09.605716vps751288.ovh.net sshd\[25712\]: Failed password for root from 222.186.173.154 port 51976 ssh2
2020-08-29T00:31:13.286059vps751288.ovh.net sshd\[25712\]: Failed password for root from 222.186.173.154 port 51976 ssh2
2020-08-29 06:37:39
206.189.129.144 attackbots
Invalid user tyb from 206.189.129.144 port 55786
2020-08-29 06:19:49
103.23.100.87 attackbotsspam
Aug 28 15:06:56 dignus sshd[11279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87  user=root
Aug 28 15:06:58 dignus sshd[11279]: Failed password for root from 103.23.100.87 port 41954 ssh2
Aug 28 15:09:00 dignus sshd[11549]: Invalid user andres from 103.23.100.87 port 55409
Aug 28 15:09:00 dignus sshd[11549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87
Aug 28 15:09:01 dignus sshd[11549]: Failed password for invalid user andres from 103.23.100.87 port 55409 ssh2
...
2020-08-29 06:28:28
92.222.74.255 attack
prod8
...
2020-08-29 06:30:41
80.211.139.7 attackspambots
Invalid user monika from 80.211.139.7 port 46414
2020-08-29 06:24:04
222.186.180.17 attackspam
Aug 29 00:28:59 theomazars sshd[10645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Aug 29 00:29:01 theomazars sshd[10645]: Failed password for root from 222.186.180.17 port 31934 ssh2
2020-08-29 06:29:48
118.89.231.121 attackspam
Aug 28 22:22:56 sshgateway sshd\[8065\]: Invalid user p from 118.89.231.121
Aug 28 22:22:56 sshgateway sshd\[8065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.231.121
Aug 28 22:22:58 sshgateway sshd\[8065\]: Failed password for invalid user p from 118.89.231.121 port 34330 ssh2
2020-08-29 06:38:54
51.104.242.17 attackspambots
SSH Invalid Login
2020-08-29 06:32:36
106.12.57.149 attack
Invalid user oracle from 106.12.57.149 port 60870
2020-08-29 06:18:00
193.107.90.185 attackspambots
Invalid user cisco from 193.107.90.185 port 52661
2020-08-29 06:51:58
189.112.90.132 attackspam
Aug 28 18:27:30 vps46666688 sshd[12990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.90.132
Aug 28 18:27:32 vps46666688 sshd[12990]: Failed password for invalid user red from 189.112.90.132 port 39735 ssh2
...
2020-08-29 06:23:08
175.24.135.90 attackbots
Aug 29 00:48:36 haigwepa sshd[22774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.135.90 
Aug 29 00:48:37 haigwepa sshd[22774]: Failed password for invalid user test1 from 175.24.135.90 port 41392 ssh2
...
2020-08-29 06:49:27
141.98.10.214 attackbots
Aug 29 05:35:23 itv-usvr-02 sshd[11673]: Invalid user admin from 141.98.10.214 port 35951
Aug 29 05:35:23 itv-usvr-02 sshd[11673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.214
Aug 29 05:35:23 itv-usvr-02 sshd[11673]: Invalid user admin from 141.98.10.214 port 35951
Aug 29 05:35:25 itv-usvr-02 sshd[11673]: Failed password for invalid user admin from 141.98.10.214 port 35951 ssh2
Aug 29 05:35:49 itv-usvr-02 sshd[11740]: Invalid user admin from 141.98.10.214 port 36799
2020-08-29 06:51:24
213.217.1.35 attackbotsspam
[H1] Blocked by UFW
2020-08-29 06:43:33
87.251.74.18 attackbotsspam
[MK-VM4] Blocked by UFW
2020-08-29 06:30:04

Recently Reported IPs

85.254.128.214 84.241.46.219 177.130.138.14 60.160.45.39
178.170.201.62 186.58.192.149 148.88.16.134 161.146.24.237
163.16.163.134 23.173.140.206 92.65.251.19 190.149.75.163
221.18.255.155 16.230.45.124 92.214.69.3 77.204.108.16
186.47.16.147 106.213.198.210 73.25.56.46 224.95.20.199