Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.214.22.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.214.22.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 16:15:55 CST 2025
;; MSG SIZE  rcvd: 106
Host info
241.22.214.70.in-addr.arpa domain name pointer 241.sub-70-214-22.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.22.214.70.in-addr.arpa	name = 241.sub-70-214-22.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.6.229.60 attackspam
$f2bV_matches
2020-02-27 04:45:07
49.88.112.114 attack
Feb 26 10:13:33 hpm sshd\[19000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Feb 26 10:13:35 hpm sshd\[19000\]: Failed password for root from 49.88.112.114 port 38951 ssh2
Feb 26 10:17:53 hpm sshd\[19344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Feb 26 10:17:55 hpm sshd\[19344\]: Failed password for root from 49.88.112.114 port 54065 ssh2
Feb 26 10:22:14 hpm sshd\[19699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2020-02-27 04:36:55
206.174.214.90 attack
$f2bV_matches
2020-02-27 04:31:56
204.48.26.122 attackbotsspam
$f2bV_matches
2020-02-27 04:35:29
91.215.244.12 attackbotsspam
$f2bV_matches
2020-02-27 04:26:27
203.220.101.126 attackspambots
$f2bV_matches
2020-02-27 04:57:08
206.189.146.13 attackbots
$f2bV_matches
2020-02-27 04:22:59
203.195.218.90 attackspambots
$f2bV_matches
2020-02-27 04:59:42
204.93.193.178 attack
$f2bV_matches
2020-02-27 04:34:36
1.161.32.135 attackspambots
suspicious action Wed, 26 Feb 2020 10:33:41 -0300
2020-02-27 04:53:49
73.66.93.2 attackspam
Honeypot attack, port: 81, PTR: c-73-66-93-2.hsd1.ca.comcast.net.
2020-02-27 04:40:00
203.99.62.158 attackspam
$f2bV_matches
2020-02-27 04:37:52
122.117.19.166 attack
suspicious action Wed, 26 Feb 2020 10:33:59 -0300
2020-02-27 04:36:36
218.250.26.17 attackspam
Honeypot attack, port: 5555, PTR: n218250026017.netvigator.com.
2020-02-27 04:45:42
218.92.0.138 attackspambots
SSH login attempts
2020-02-27 04:46:09

Recently Reported IPs

229.77.113.176 79.111.150.28 165.47.7.49 163.36.164.1
97.37.89.115 247.166.107.0 153.137.239.228 17.221.29.39
178.213.51.141 219.19.169.246 75.94.177.246 181.150.244.102
2.96.0.133 213.219.125.100 140.16.47.115 196.89.104.103
124.223.160.174 133.156.154.30 129.64.253.110 238.190.53.169