Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.245.134.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;70.245.134.118.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111301 1800 900 604800 86400

;; Query time: 135 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 14 04:05:36 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 118.134.245.70.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.134.245.70.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.156.38.158 attackspambots
Jun 27 14:17:16 debian-2gb-nbg1-2 kernel: \[15518888.377839\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=218.156.38.158 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=42925 PROTO=TCP SPT=1077 DPT=23 WINDOW=8213 RES=0x00 SYN URGP=0
2020-06-28 01:34:21
200.70.33.244 attackbots
Unauthorized connection attempt detected, IP banned.
2020-06-28 00:58:42
192.42.116.18 attackspambots
Jun 27 12:17:38 IngegnereFirenze sshd[30496]: User sshd from 192.42.116.18 not allowed because not listed in AllowUsers
...
2020-06-28 01:17:59
92.222.77.150 attack
2020-06-27T14:17:11.3381641240 sshd\[2263\]: Invalid user qbtuser from 92.222.77.150 port 60104
2020-06-27T14:17:11.3416921240 sshd\[2263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.77.150
2020-06-27T14:17:13.4368121240 sshd\[2263\]: Failed password for invalid user qbtuser from 92.222.77.150 port 60104 ssh2
...
2020-06-28 01:37:36
37.192.95.140 attackbotsspam
CVE-2018-7600 SA-CORE-2018-002
2020-06-28 01:35:55
111.93.71.219 attackspam
Jun 27 17:04:49 ns382633 sshd\[8155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219  user=root
Jun 27 17:04:51 ns382633 sshd\[8155\]: Failed password for root from 111.93.71.219 port 53617 ssh2
Jun 27 17:10:26 ns382633 sshd\[9645\]: Invalid user jumper from 111.93.71.219 port 57451
Jun 27 17:10:26 ns382633 sshd\[9645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219
Jun 27 17:10:28 ns382633 sshd\[9645\]: Failed password for invalid user jumper from 111.93.71.219 port 57451 ssh2
2020-06-28 01:12:44
182.61.65.47 attackbots
20 attempts against mh-ssh on cloud
2020-06-28 01:19:01
106.75.176.189 attackbotsspam
Jun 27 17:46:38 localhost sshd\[17273\]: Invalid user stas from 106.75.176.189
Jun 27 17:46:38 localhost sshd\[17273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.176.189
Jun 27 17:46:40 localhost sshd\[17273\]: Failed password for invalid user stas from 106.75.176.189 port 49382 ssh2
Jun 27 17:48:46 localhost sshd\[17366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.176.189  user=root
Jun 27 17:48:48 localhost sshd\[17366\]: Failed password for root from 106.75.176.189 port 44664 ssh2
...
2020-06-28 01:34:44
218.92.0.247 attack
2020-06-27T19:21:07.402844sd-86998 sshd[31869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
2020-06-27T19:21:08.983432sd-86998 sshd[31869]: Failed password for root from 218.92.0.247 port 57359 ssh2
2020-06-27T19:21:12.316352sd-86998 sshd[31869]: Failed password for root from 218.92.0.247 port 57359 ssh2
2020-06-27T19:21:07.402844sd-86998 sshd[31869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
2020-06-27T19:21:08.983432sd-86998 sshd[31869]: Failed password for root from 218.92.0.247 port 57359 ssh2
2020-06-27T19:21:12.316352sd-86998 sshd[31869]: Failed password for root from 218.92.0.247 port 57359 ssh2
2020-06-27T19:21:07.402844sd-86998 sshd[31869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
2020-06-27T19:21:08.983432sd-86998 sshd[31869]: Failed password for root from 218.92.0.247 p
...
2020-06-28 01:29:31
183.166.149.109 attack
Jun 27 14:12:52 srv01 postfix/smtpd\[10218\]: warning: unknown\[183.166.149.109\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 14:16:42 srv01 postfix/smtpd\[14425\]: warning: unknown\[183.166.149.109\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 14:16:53 srv01 postfix/smtpd\[14425\]: warning: unknown\[183.166.149.109\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 14:17:09 srv01 postfix/smtpd\[14425\]: warning: unknown\[183.166.149.109\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 14:17:28 srv01 postfix/smtpd\[14425\]: warning: unknown\[183.166.149.109\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-28 01:25:42
167.71.209.2 attackspambots
Jun 27 08:33:40 pixelmemory sshd[2605902]: Invalid user test from 167.71.209.2 port 42108
Jun 27 08:33:42 pixelmemory sshd[2605902]: Failed password for invalid user test from 167.71.209.2 port 42108 ssh2
Jun 27 08:37:35 pixelmemory sshd[2623915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.209.2  user=root
Jun 27 08:37:37 pixelmemory sshd[2623915]: Failed password for root from 167.71.209.2 port 33394 ssh2
Jun 27 08:41:29 pixelmemory sshd[2639330]: Invalid user hadoop from 167.71.209.2 port 52914
...
2020-06-28 00:59:09
210.56.111.101 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-06-28 01:00:46
165.0.84.221 attackbots
2020-06-27 07:12:41.133660-0500  localhost smtpd[80928]: NOQUEUE: reject: RCPT from unknown[165.0.84.221]: 554 5.7.1 Service unavailable; Client host [165.0.84.221] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/165.0.84.221; from= to= proto=ESMTP helo=<[165.0.84.221]>
2020-06-28 00:54:47
46.103.58.90 attackspam
SSH invalid-user multiple login try
2020-06-28 01:32:03
129.204.38.234 attackbotsspam
$f2bV_matches
2020-06-28 01:07:26

Recently Reported IPs

110.84.221.90 31.167.41.248 153.187.74.156 135.241.104.24
120.32.63.22 45.170.148.204 122.238.137.247 85.240.35.116
97.14.56.30 177.38.70.38 165.93.210.169 228.107.130.99
151.62.165.180 140.112.249.91 47.254.127.60 223.67.186.107
174.152.44.138 121.158.194.65 14.207.196.2 102.57.48.146