Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.241.134.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.241.134.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 09:52:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 214.134.241.70.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.134.241.70.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.151.177.85 attackspambots
Jul 17 13:33:55 plex-server sshd[2626086]: Invalid user user from 62.151.177.85 port 37182
Jul 17 13:33:55 plex-server sshd[2626086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.151.177.85 
Jul 17 13:33:55 plex-server sshd[2626086]: Invalid user user from 62.151.177.85 port 37182
Jul 17 13:33:57 plex-server sshd[2626086]: Failed password for invalid user user from 62.151.177.85 port 37182 ssh2
Jul 17 13:36:36 plex-server sshd[2626999]: Invalid user xiaoyan from 62.151.177.85 port 51300
...
2020-07-17 21:44:39
111.198.61.150 attack
SSH Brute-Force reported by Fail2Ban
2020-07-17 21:27:53
1.194.238.187 attackspambots
Jul 17 15:17:20 ns381471 sshd[3342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.194.238.187
Jul 17 15:17:22 ns381471 sshd[3342]: Failed password for invalid user sirius from 1.194.238.187 port 40403 ssh2
2020-07-17 21:38:26
106.13.133.190 attackbots
(sshd) Failed SSH login from 106.13.133.190 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 17 13:52:46 grace sshd[28729]: Invalid user kelly from 106.13.133.190 port 50090
Jul 17 13:52:48 grace sshd[28729]: Failed password for invalid user kelly from 106.13.133.190 port 50090 ssh2
Jul 17 14:10:06 grace sshd[31353]: Invalid user josep from 106.13.133.190 port 56866
Jul 17 14:10:08 grace sshd[31353]: Failed password for invalid user josep from 106.13.133.190 port 56866 ssh2
Jul 17 14:16:08 grace sshd[32485]: Invalid user git from 106.13.133.190 port 38954
2020-07-17 21:13:32
49.235.90.32 attackbots
Jul 17 12:21:26 django-0 sshd[20817]: Invalid user hxl from 49.235.90.32
...
2020-07-17 21:16:33
106.75.231.107 attack
$f2bV_matches
2020-07-17 21:16:17
218.78.105.98 attack
Jul 17 14:14:17 melroy-server sshd[8470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.105.98 
Jul 17 14:14:19 melroy-server sshd[8470]: Failed password for invalid user boss from 218.78.105.98 port 42964 ssh2
...
2020-07-17 21:18:16
91.121.65.15 attackspambots
Tried sshing with brute force.
2020-07-17 21:40:51
52.188.70.197 attackbotsspam
Website hacking attempts.
2020-07-17 21:26:01
139.198.122.19 attack
Jul 17 15:36:05 pve1 sshd[3983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.19 
Jul 17 15:36:07 pve1 sshd[3983]: Failed password for invalid user demo from 139.198.122.19 port 59434 ssh2
...
2020-07-17 21:36:56
200.68.59.90 attackspam
1594988072 - 07/17/2020 14:14:32 Host: 200.68.59.90/200.68.59.90 Port: 445 TCP Blocked
2020-07-17 21:04:34
144.91.118.124 attackbotsspam
Unauthorised access (Jul 17) SRC=144.91.118.124 LEN=52 TTL=117 ID=14903 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-17 21:07:05
198.211.108.68 attackbotsspam
198.211.108.68 - - [17/Jul/2020:13:14:11 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.108.68 - - [17/Jul/2020:13:14:13 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1857 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.108.68 - - [17/Jul/2020:13:14:13 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-17 21:24:27
177.67.14.222 attack
Unauthorised access (Jul 17) SRC=177.67.14.222 LEN=52 TOS=0x10 PREC=0x40 TTL=108 ID=29736 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-17 21:29:58
106.13.42.140 attackbots
Jul 17 12:54:32 plex-server sshd[2612471]: Invalid user webmaster from 106.13.42.140 port 40552
Jul 17 12:54:32 plex-server sshd[2612471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.42.140 
Jul 17 12:54:32 plex-server sshd[2612471]: Invalid user webmaster from 106.13.42.140 port 40552
Jul 17 12:54:34 plex-server sshd[2612471]: Failed password for invalid user webmaster from 106.13.42.140 port 40552 ssh2
Jul 17 12:59:02 plex-server sshd[2613970]: Invalid user wrk from 106.13.42.140 port 38494
...
2020-07-17 21:15:09

Recently Reported IPs

42.152.175.124 201.54.99.24 210.57.222.71 56.45.6.49
135.117.196.34 53.205.42.34 223.136.43.185 16.175.32.110
88.218.84.21 26.85.54.22 192.2.36.49 4.175.227.233
24.149.79.118 47.205.241.250 187.108.185.207 236.240.49.15
36.59.21.241 200.62.122.229 96.142.73.252 41.233.47.40