Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Perth Amboy

Region: New Jersey

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.21.219.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.21.219.220.			IN	A

;; AUTHORITY SECTION:
.			24	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011701 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 18 02:52:12 CST 2023
;; MSG SIZE  rcvd: 106
Host info
220.219.21.70.in-addr.arpa domain name pointer pool-70-21-219-220.nwrk.east.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.219.21.70.in-addr.arpa	name = pool-70-21-219-220.nwrk.east.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.232.76.13 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:45:26
159.203.201.127 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 4331 proto: TCP cat: Misc Attack
2019-11-03 07:50:10
167.250.3.244 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:47:32
171.224.189.106 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:45:52
159.203.201.85 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:50:32
182.245.167.54 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:31:57
182.253.70.103 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:31:29
185.216.32.170 attack
11/02/2019-19:18:42.577732 185.216.32.170 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 17
2019-11-03 07:24:03
184.154.47.3 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:26:18
139.162.109.43 attack
111/tcp 111/tcp 111/tcp...
[2019-09-02/11-02]88pkt,1pt.(tcp)
2019-11-03 07:56:00
152.32.98.139 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:52:32
187.57.121.95 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:20:21
178.254.221.33 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:38:49
177.39.81.105 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:41:59
156.0.239.102 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:52:01

Recently Reported IPs

73.252.84.41 35.61.84.51 30.0.79.0 249.26.107.104
149.13.10.20 213.131.221.130 192.133.86.171 137.194.38.229
135.43.212.202 135.24.240.65 131.159.218.18 230.119.52.164
11.40.153.241 150.5.138.249 135.86.198.191 241.67.118.155
46.126.214.173 185.107.81.137 84.17.46.200 202.197.52.66