Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kansas City

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.9.48.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.9.48.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 09:28:44 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 222.48.9.70.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 222.48.9.70.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
103.129.221.62 attackspam
$f2bV_matches
2019-09-20 23:13:02
1.172.190.227 attackspam
Port Scan: TCP/23
2019-09-20 23:11:10
178.150.216.229 attackbotsspam
Sep 20 11:02:40 xtremcommunity sshd\[285924\]: Invalid user webadmin from 178.150.216.229 port 41600
Sep 20 11:02:40 xtremcommunity sshd\[285924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
Sep 20 11:02:42 xtremcommunity sshd\[285924\]: Failed password for invalid user webadmin from 178.150.216.229 port 41600 ssh2
Sep 20 11:07:38 xtremcommunity sshd\[286018\]: Invalid user wwwadm from 178.150.216.229 port 54422
Sep 20 11:07:38 xtremcommunity sshd\[286018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
...
2019-09-20 23:14:41
72.196.173.194 attackspam
Port Scan: UDP/137
2019-09-20 22:48:15
210.56.28.219 attackspam
Sep 20 17:03:45 rpi sshd[4901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.28.219 
Sep 20 17:03:47 rpi sshd[4901]: Failed password for invalid user joeflores from 210.56.28.219 port 51632 ssh2
2019-09-20 23:31:54
50.4.181.23 attackbotsspam
Port Scan: TCP/443
2019-09-20 22:53:54
95.70.178.185 attackspam
Port Scan: UDP/30
2019-09-20 23:05:40
103.90.224.155 attack
Forged login request.
2019-09-20 23:29:00
72.228.93.7 attackbotsspam
Port Scan: UDP/137
2019-09-20 23:07:11
188.126.72.120 attackspam
Port Scan: TCP/445
2019-09-20 23:01:08
190.17.117.73 attack
Port Scan: TCP/34567
2019-09-20 23:00:46
71.74.145.20 attackbotsspam
Port Scan: UDP/774
2019-09-20 23:07:30
202.131.126.139 attack
Invalid user simon from 202.131.126.139 port 40022
2019-09-20 23:16:17
106.12.13.247 attackbots
Sep 20 13:58:16 OPSO sshd\[1289\]: Invalid user at from 106.12.13.247 port 43708
Sep 20 13:58:16 OPSO sshd\[1289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
Sep 20 13:58:18 OPSO sshd\[1289\]: Failed password for invalid user at from 106.12.13.247 port 43708 ssh2
Sep 20 14:02:24 OPSO sshd\[2048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247  user=root
Sep 20 14:02:26 OPSO sshd\[2048\]: Failed password for root from 106.12.13.247 port 47712 ssh2
2019-09-20 23:37:43
13.66.139.0 attackbots
Port Scan: TCP/443
2019-09-20 23:10:20

Recently Reported IPs

61.194.61.181 235.191.192.209 73.169.222.87 254.68.76.204
84.35.146.165 6.255.202.247 219.185.148.149 7.200.145.112
18.194.228.101 86.247.212.248 91.156.40.30 97.239.66.218
79.138.220.196 253.230.231.141 121.77.46.69 239.67.213.171
122.185.66.66 44.185.188.225 180.82.115.163 28.27.46.158