Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gilbert

Region: Arizona

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.199.239.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.199.239.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400

;; Query time: 222 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 27 23:25:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
72.239.199.70.in-addr.arpa domain name pointer 72.sub-70-199-239.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.239.199.70.in-addr.arpa	name = 72.sub-70-199-239.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
158.69.192.214 attackspambots
Jul 15 13:33:30 vtv3 sshd\[12324\]: Invalid user sinusbot from 158.69.192.214 port 53856
Jul 15 13:33:30 vtv3 sshd\[12324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.214
Jul 15 13:33:32 vtv3 sshd\[12324\]: Failed password for invalid user sinusbot from 158.69.192.214 port 53856 ssh2
Jul 15 13:39:14 vtv3 sshd\[14979\]: Invalid user godbole from 158.69.192.214 port 37994
Jul 15 13:39:14 vtv3 sshd\[14979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.214
Jul 15 13:51:50 vtv3 sshd\[21324\]: Invalid user anni from 158.69.192.214 port 56054
Jul 15 13:51:50 vtv3 sshd\[21324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.214
Jul 15 13:51:52 vtv3 sshd\[21324\]: Failed password for invalid user anni from 158.69.192.214 port 56054 ssh2
Jul 15 13:56:06 vtv3 sshd\[23472\]: Invalid user confluence from 158.69.192.214 port 52672
Jul 15 13:56:06 vtv3
2019-07-16 08:28:36
206.201.0.226 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 15:19:24,596 INFO [amun_request_handler] PortScan Detected on Port: 445 (206.201.0.226)
2019-07-16 07:50:27
142.93.101.148 attack
Jul 16 02:17:40 meumeu sshd[12053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148 
Jul 16 02:17:42 meumeu sshd[12053]: Failed password for invalid user bot from 142.93.101.148 port 55116 ssh2
Jul 16 02:22:14 meumeu sshd[13016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148 
...
2019-07-16 08:23:04
157.230.116.99 attack
Jul 15 16:43:44 mail sshd\[15160\]: Invalid user test from 157.230.116.99 port 40518
Jul 15 16:43:44 mail sshd\[15160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.116.99
Jul 15 16:43:46 mail sshd\[15160\]: Failed password for invalid user test from 157.230.116.99 port 40518 ssh2
Jul 15 16:48:25 mail sshd\[15220\]: Invalid user sin from 157.230.116.99 port 39426
Jul 15 16:48:25 mail sshd\[15220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.116.99
...
2019-07-16 08:25:26
171.127.162.123 attackspam
Automatic report - Port Scan Attack
2019-07-16 08:20:43
46.105.124.52 attackbotsspam
Invalid user tushar from 46.105.124.52 port 41075
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.124.52
Failed password for invalid user tushar from 46.105.124.52 port 41075 ssh2
Invalid user ts2 from 46.105.124.52 port 38647
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.124.52
2019-07-16 08:29:06
180.241.45.58 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 16:04:58,271 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.241.45.58)
2019-07-16 07:53:01
157.230.183.255 attack
Jul 16 01:43:55 OPSO sshd\[1118\]: Invalid user postgres from 157.230.183.255 port 37468
Jul 16 01:43:55 OPSO sshd\[1118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.183.255
Jul 16 01:43:57 OPSO sshd\[1118\]: Failed password for invalid user postgres from 157.230.183.255 port 37468 ssh2
Jul 16 01:48:23 OPSO sshd\[1895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.183.255  user=root
Jul 16 01:48:25 OPSO sshd\[1895\]: Failed password for root from 157.230.183.255 port 36002 ssh2
2019-07-16 07:58:45
60.191.38.77 attackbots
Port scan: Attack repeated for 24 hours 60.191.38.77 - - [23/Jun/2018:04:31:03  0300] "GET / HTTP/1.1" 404 2135 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:47.0) Gecko/20100101 Firefox/47.0"
2019-07-16 08:22:02
190.200.249.94 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 15:18:57,532 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.200.249.94)
2019-07-16 07:53:57
162.243.61.72 attackspam
Jul 16 02:13:11 icinga sshd[4903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.61.72
Jul 16 02:13:13 icinga sshd[4903]: Failed password for invalid user jared from 162.243.61.72 port 36524 ssh2
...
2019-07-16 08:21:30
179.49.57.154 attackspam
Automatic report - Banned IP Access
2019-07-16 07:58:17
202.29.57.103 attackspam
Test report from splunk app
2019-07-16 08:32:29
68.183.219.43 attackspambots
Jul 16 01:48:44 vps647732 sshd[25607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43
Jul 16 01:48:46 vps647732 sshd[25607]: Failed password for invalid user support from 68.183.219.43 port 54600 ssh2
...
2019-07-16 08:10:05
41.191.244.2 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-16/07-15]17pkt,1pt.(tcp)
2019-07-16 07:48:56

Recently Reported IPs

215.220.207.113 76.180.46.252 29.41.173.224 199.129.83.92
8.129.63.190 26.152.101.74 43.16.10.109 92.33.247.107
205.93.39.86 126.58.40.84 199.239.131.198 120.5.204.76
14.184.172.93 123.38.33.75 60.69.103.173 70.115.136.146
74.4.88.70 51.144.87.230 21.82.191.255 4.94.186.42