Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.54.3.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;70.54.3.5.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103000 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 16:28:24 CST 2019
;; MSG SIZE  rcvd: 113
Host info
5.3.54.70.in-addr.arpa domain name pointer bas4-kingston08-70-54-3-5.dsl.bell.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.3.54.70.in-addr.arpa	name = bas4-kingston08-70-54-3-5.dsl.bell.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.58.166 attackspam
Sep 30 04:12:51 friendsofhawaii sshd\[20048\]: Invalid user intekhab from 182.61.58.166
Sep 30 04:12:51 friendsofhawaii sshd\[20048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.166
Sep 30 04:12:54 friendsofhawaii sshd\[20048\]: Failed password for invalid user intekhab from 182.61.58.166 port 37520 ssh2
Sep 30 04:17:58 friendsofhawaii sshd\[20453\]: Invalid user n from 182.61.58.166
Sep 30 04:17:58 friendsofhawaii sshd\[20453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.166
2019-10-01 04:06:47
125.161.76.146 attackspam
445/tcp
[2019-09-30]1pkt
2019-10-01 04:00:25
62.2.136.87 attack
2019-09-30T20:09:27.623747abusebot-7.cloudsearch.cf sshd\[24168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-2-136-87.static.cablecom.ch  user=root
2019-10-01 04:27:56
51.158.184.28 attack
Automatic report - Banned IP Access
2019-10-01 04:20:25
167.114.18.68 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-10-01 04:22:09
36.229.105.198 attackspam
23/tcp
[2019-09-30]1pkt
2019-10-01 04:21:27
45.249.111.40 attack
Sep 30 11:00:18 mail sshd\[9246\]: Invalid user Juhana from 45.249.111.40
...
2019-10-01 03:51:59
197.41.157.80 attackbotsspam
Honeypot attack, port: 23, PTR: host-197.41.157.80.tedata.net.
2019-10-01 03:56:02
156.206.42.143 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-10-01 03:52:19
209.59.104.193 attackspam
ssh failed login
2019-10-01 03:54:02
151.50.64.41 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-10-01 04:26:33
122.139.40.116 attack
Automated reporting of FTP Brute Force
2019-10-01 04:03:35
36.237.110.52 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-01 04:04:31
211.24.103.163 attack
Automatic report - Banned IP Access
2019-10-01 04:09:28
36.112.137.55 attackbots
Sep 30 12:00:46 ip-172-31-62-245 sshd\[22733\]: Invalid user luca from 36.112.137.55\
Sep 30 12:00:48 ip-172-31-62-245 sshd\[22733\]: Failed password for invalid user luca from 36.112.137.55 port 34275 ssh2\
Sep 30 12:05:50 ip-172-31-62-245 sshd\[22785\]: Invalid user tasatje from 36.112.137.55\
Sep 30 12:05:52 ip-172-31-62-245 sshd\[22785\]: Failed password for invalid user tasatje from 36.112.137.55 port 52521 ssh2\
Sep 30 12:10:46 ip-172-31-62-245 sshd\[22898\]: Invalid user done from 36.112.137.55\
2019-10-01 03:50:12

Recently Reported IPs

64.253.117.123 85.170.134.215 37.40.127.50 235.91.182.164
242.14.134.137 14.249.201.15 70.126.161.56 134.5.63.47
155.183.234.249 239.152.86.41 24.39.138.140 144.130.123.64
248.50.132.223 104.32.45.22 80.133.30.21 88.236.235.48
178.46.208.48 122.5.138.233 210.183.199.121 138.7.71.8