Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Calgary

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.75.57.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.75.57.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 12:37:09 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 166.57.75.70.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.57.75.70.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.243.82.252 attack
SSH/22 MH Probe, BF, Hack -
2019-11-28 06:17:16
200.109.192.136 attack
Unauthorized connection attempt from IP address 200.109.192.136 on Port 445(SMB)
2019-11-28 06:21:26
190.1.142.21 attack
UTC: 2019-11-26 port: 23/tcp
2019-11-28 06:10:24
106.13.146.93 attackbots
Nov 27 20:39:35 markkoudstaal sshd[27975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.146.93
Nov 27 20:39:37 markkoudstaal sshd[27975]: Failed password for invalid user bovim from 106.13.146.93 port 38456 ssh2
Nov 27 20:46:07 markkoudstaal sshd[28588]: Failed password for root from 106.13.146.93 port 41466 ssh2
2019-11-28 05:46:15
187.87.39.147 attackbotsspam
Nov 27 22:21:47 jane sshd[9251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.39.147 
Nov 27 22:21:49 jane sshd[9251]: Failed password for invalid user razak from 187.87.39.147 port 39970 ssh2
...
2019-11-28 06:22:07
78.186.151.3 attackbots
Unauthorized connection attempt from IP address 78.186.151.3 on Port 445(SMB)
2019-11-28 06:06:30
112.122.65.52 attackspambots
UTC: 2019-11-26 port: 23/tcp
2019-11-28 05:52:35
103.212.19.51 attack
Unauthorized connection attempt from IP address 103.212.19.51 on Port 445(SMB)
2019-11-28 05:49:44
14.244.43.140 attack
Nov 27 15:33:53 h2177944 kernel: \[7740540.379741\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=54 ID=12620 DF PROTO=TCP SPT=59550 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov 27 15:33:56 h2177944 kernel: \[7740543.418852\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=54 ID=13225 DF PROTO=TCP SPT=59550 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov 27 15:34:02 h2177944 kernel: \[7740549.417818\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=54 ID=13336 DF PROTO=TCP SPT=59550 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov 27 15:46:27 h2177944 kernel: \[7741294.073958\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=54 ID=14502 DF PROTO=TCP SPT=65082 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov 27 15:46:30 h2177944 kernel: \[7741297.069231\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=
2019-11-28 06:00:51
120.29.157.253 attack
Unauthorized connection attempt from IP address 120.29.157.253 on Port 445(SMB)
2019-11-28 06:16:53
201.1.70.112 attackbotsspam
11/27/2019-15:46:40.175393 201.1.70.112 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-28 05:53:35
36.77.94.4 attackbotsspam
Unauthorized connection attempt from IP address 36.77.94.4 on Port 445(SMB)
2019-11-28 06:00:30
190.191.12.46 attackbotsspam
190.191.12.46 - - \[27/Nov/2019:15:45:58 +0100\] "POST /wp-login.php HTTP/1.0" 200 7538 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
190.191.12.46 - - \[27/Nov/2019:15:46:01 +0100\] "POST /wp-login.php HTTP/1.0" 200 7358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
190.191.12.46 - - \[27/Nov/2019:15:46:05 +0100\] "POST /wp-login.php HTTP/1.0" 200 7363 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-28 06:21:43
178.34.154.51 attackspam
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-11-28 05:51:10
176.227.246.139 attackspam
Unauthorized connection attempt from IP address 176.227.246.139 on Port 445(SMB)
2019-11-28 06:11:44

Recently Reported IPs

175.11.92.73 99.186.142.42 34.43.147.211 189.242.118.242
149.115.43.105 16.52.216.88 205.56.14.40 172.246.155.69
17.209.50.92 95.197.24.118 115.226.145.64 134.36.133.119
232.97.144.163 249.43.167.191 95.214.183.25 23.11.208.159
30.203.24.148 45.236.82.52 250.148.88.123 216.218.69.36