Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Port Coquitlam

Region: British Columbia

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.68.72.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.68.72.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025070500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 05 21:22:56 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'14.72.68.70.in-addr.arpa domain name pointer s01061c9d727579bb.vf.shawcable.net.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.72.68.70.in-addr.arpa	name = S01061c9d727579bb.vf.shawcable.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.114.138.234 attackbotsspam
1433/tcp
[2019-11-03]1pkt
2019-11-03 17:59:50
71.14.170.158 attackspam
1433/tcp
[2019-11-03]1pkt
2019-11-03 17:46:41
89.248.174.216 attackbots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-11-03 17:48:48
190.116.49.2 attack
detected by Fail2Ban
2019-11-03 18:01:31
221.205.85.96 attackspam
8080/tcp
[2019-11-03]1pkt
2019-11-03 17:37:52
185.189.103.186 attack
scan z
2019-11-03 17:42:28
111.93.52.182 attackbotsspam
Nov  3 14:54:47 areeb-Workstation sshd[15692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.52.182
Nov  3 14:54:48 areeb-Workstation sshd[15692]: Failed password for invalid user cyndi from 111.93.52.182 port 60378 ssh2
...
2019-11-03 17:49:57
1.179.128.124 attackspambots
1433/tcp
[2019-11-03]1pkt
2019-11-03 18:04:38
200.84.125.57 attack
1433/tcp
[2019-11-03]1pkt
2019-11-03 17:43:00
80.211.128.151 attackspambots
Nov  3 10:20:49 bouncer sshd\[24858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.128.151  user=root
Nov  3 10:20:51 bouncer sshd\[24858\]: Failed password for root from 80.211.128.151 port 51084 ssh2
Nov  3 10:27:56 bouncer sshd\[24895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.128.151  user=root
...
2019-11-03 17:48:16
113.131.200.22 attackbots
9527/tcp
[2019-11-03]1pkt
2019-11-03 17:39:19
195.154.191.151 attack
$f2bV_matches
2019-11-03 17:47:39
210.212.203.67 attack
2019-11-03T09:40:04.363188abusebot-6.cloudsearch.cf sshd\[12956\]: Invalid user rosemarie from 210.212.203.67 port 33676
2019-11-03 17:50:58
138.68.250.76 attackbots
2019-11-03T08:51:04.803643abusebot-5.cloudsearch.cf sshd\[1237\]: Invalid user ubnt!@\# from 138.68.250.76 port 50008
2019-11-03 17:52:21
167.99.65.138 attackspam
2019-11-03T07:49:42.427463shield sshd\[23712\]: Invalid user qa from 167.99.65.138 port 57416
2019-11-03T07:49:42.431765shield sshd\[23712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138
2019-11-03T07:49:43.942159shield sshd\[23712\]: Failed password for invalid user qa from 167.99.65.138 port 57416 ssh2
2019-11-03T07:54:00.656400shield sshd\[25147\]: Invalid user Sun@123 from 167.99.65.138 port 38946
2019-11-03T07:54:00.662351shield sshd\[25147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138
2019-11-03 18:04:02

Recently Reported IPs

54.64.116.138 91.20.196.60 27.245.226.232 44.42.163.83
203.54.71.63 170.76.47.46 131.46.142.57 220.3.172.231
107.115.188.17 175.80.77.88 165.154.234.193 165.154.234.211
114.10.100.114 150.189.183.66 47.84.73.192 167.94.138.194
170.106.165.76 17.121.51.4 126.83.161.113 101.189.243.247