Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Albert Lea

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.39.0.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.39.0.16.			IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023041300 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 13 23:21:37 CST 2023
;; MSG SIZE  rcvd: 103
Host info
16.0.39.70.in-addr.arpa domain name pointer e7r2-dyn-70.39.0.16.wctatel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.0.39.70.in-addr.arpa	name = e7r2-dyn-70.39.0.16.wctatel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.61.66.40 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 108 - Tue Aug 21 00:10:20 2018
2020-09-25 19:39:18
124.113.2.156 attackspambots
Brute force blocker - service: proftpd1 - aantal: 101 - Thu Aug 23 12:40:18 2018
2020-09-25 18:51:39
161.35.168.64 attackbotsspam
20 attempts against mh-ssh on star
2020-09-25 19:17:22
177.130.248.6 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 177.130.248.6 (ip-177-130-248-6.nipox.net.br): 5 in the last 3600 secs - Tue Aug 21 13:33:57 2018
2020-09-25 19:34:13
5.188.86.164 attackbots
SSH Bruteforce Attempt on Honeypot
2020-09-25 19:27:48
222.133.73.98 attack
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=6998  .  dstport=23  .     (3611)
2020-09-25 19:15:54
91.106.45.212 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-25 19:23:50
120.70.253.171 attackbots
Brute force blocker - service: proftpd1 - aantal: 77 - Mon Aug 20 14:00:18 2018
2020-09-25 19:40:46
51.178.81.134 attackspambots
Automatic report - Banned IP Access
2020-09-25 19:07:22
5.135.177.5 attackspam
5.135.177.5 - - [25/Sep/2020:10:13:48 +0100] "POST /wp-login.php HTTP/1.1" 200 2863 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.135.177.5 - - [25/Sep/2020:10:13:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.135.177.5 - - [25/Sep/2020:10:13:50 +0100] "POST /wp-login.php HTTP/1.1" 200 2844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-25 18:56:09
14.169.99.179 attack
$f2bV_matches
2020-09-25 19:06:11
157.55.202.235 attack
Invalid user innerhive from 157.55.202.235 port 52178
2020-09-25 19:09:09
106.75.231.107 attackbotsspam
Invalid user admin from 106.75.231.107 port 34206
2020-09-25 19:03:12
61.75.51.38 attack
Sep 25 08:22:53 cp sshd[31652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.75.51.38
2020-09-25 19:18:28
139.59.10.27 attack
Sep 25 08:30:24 ip-172-31-16-56 sshd\[14985\]: Invalid user kiran from 139.59.10.27\
Sep 25 08:30:26 ip-172-31-16-56 sshd\[14985\]: Failed password for invalid user kiran from 139.59.10.27 port 33304 ssh2\
Sep 25 08:34:43 ip-172-31-16-56 sshd\[15038\]: Invalid user a from 139.59.10.27\
Sep 25 08:34:45 ip-172-31-16-56 sshd\[15038\]: Failed password for invalid user a from 139.59.10.27 port 43190 ssh2\
Sep 25 08:38:59 ip-172-31-16-56 sshd\[15079\]: Invalid user zabbix from 139.59.10.27\
2020-09-25 19:01:54

Recently Reported IPs

89.7.94.134 223.192.7.188 40.254.171.12 144.76.236.70
120.188.87.200 38.6.71.0 103.57.242.109 77.36.116.146
168.72.58.219 95.173.158.54 77.75.78.34 138.161.5.210
203.87.7.32 162.241.172.45 3.13.72.106 143.244.204.226
84.116.192.101 142.44.142.13 202.160.33.24 162.158.190.78