Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: US Signal Company, L.L.C.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.34.139.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25668
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;70.34.139.41.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051200 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 12 22:05:58 CST 2019
;; MSG SIZE  rcvd: 116

Host info
41.139.34.70.in-addr.arpa domain name pointer customer-70-34-139-41.host.ussignalcom.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
41.139.34.70.in-addr.arpa	name = customer-70-34-139-41.host.ussignalcom.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
42.116.195.146 attackbotsspam
Attempted connection to port 445.
2020-09-03 14:58:30
2.57.122.113 attackbotsspam
 TCP (SYN) 2.57.122.113:43656 -> port 37215, len 44
2020-09-03 15:02:50
209.141.41.22 attackbots
5800/tcp 9600/tcp 9500/tcp...
[2020-08-17/09-02]29pkt,9pt.(tcp)
2020-09-03 14:55:36
31.223.43.131 attack
Attempted connection to port 80.
2020-09-03 15:00:47
110.136.51.80 attack
Attempted connection to port 445.
2020-09-03 15:08:27
183.63.53.99 attackspambots
 TCP (SYN) 183.63.53.99:36690 -> port 23, len 44
2020-09-03 15:01:50
39.74.61.247 attackbotsspam
DATE:2020-09-02 22:19:22, IP:39.74.61.247, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-03 15:09:01
190.121.142.2 attack
Unauthorized connection attempt from IP address 190.121.142.2 on Port 445(SMB)
2020-09-03 15:16:45
177.10.241.126 attackspam
Autoban   177.10.241.126 AUTH/CONNECT
2020-09-03 15:11:20
86.213.63.181 attackspam
Invalid user ubuntu from 86.213.63.181 port 40038
2020-09-03 15:13:50
211.2.186.40 attackbotsspam
Attempted connection to port 2323.
2020-09-03 15:01:08
178.128.14.102 attackbots
Invalid user kds from 178.128.14.102 port 60106
2020-09-03 14:57:59
200.44.203.249 attackspam
Unauthorized connection attempt from IP address 200.44.203.249 on Port 445(SMB)
2020-09-03 15:24:50
144.76.96.236 attackspam
20 attempts against mh-misbehave-ban on leaf
2020-09-03 15:26:45
104.248.224.124 attackbotsspam
104.248.224.124 - - [03/Sep/2020:07:35:55 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.224.124 - - [03/Sep/2020:07:35:56 +0100] "POST /wp-login.php HTTP/1.1" 200 1685 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.224.124 - - [03/Sep/2020:07:35:56 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-03 15:04:28

Recently Reported IPs

217.246.112.79 175.209.135.243 151.253.38.219 162.223.156.244
69.12.71.70 27.71.253.185 218.38.246.251 112.255.34.75
189.224.21.125 110.115.249.95 210.198.244.59 119.181.229.76
101.166.31.86 113.90.92.154 73.205.253.245 207.28.167.186
103.71.151.55 181.113.65.164 222.187.246.214 186.67.127.18