Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Longview

Region: Texas

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.106.70.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.106.70.199.			IN	A

;; AUTHORITY SECTION:
.			165	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060401 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 05 06:46:27 CST 2020
;; MSG SIZE  rcvd: 117
Host info
199.70.106.72.in-addr.arpa domain name pointer 199.sub-72-106-70.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.70.106.72.in-addr.arpa	name = 199.sub-72-106-70.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.52.234 attackspambots
Dec  1 10:07:03 meumeu sshd[5064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234 
Dec  1 10:07:04 meumeu sshd[5064]: Failed password for invalid user xiaomin from 106.13.52.234 port 48998 ssh2
Dec  1 10:10:14 meumeu sshd[5558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234 
...
2019-12-01 18:27:16
192.99.245.135 attackspam
Dec  1 09:55:34 sauna sshd[140155]: Failed password for root from 192.99.245.135 port 56566 ssh2
...
2019-12-01 18:05:56
51.79.44.52 attackspam
Dec  1 10:36:55 SilenceServices sshd[10960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.44.52
Dec  1 10:36:57 SilenceServices sshd[10960]: Failed password for invalid user jo from 51.79.44.52 port 49562 ssh2
Dec  1 10:39:34 SilenceServices sshd[11846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.44.52
2019-12-01 18:30:26
186.93.158.153 attackbots
UTC: 2019-11-30 port: 23/tcp
2019-12-01 18:06:26
24.244.133.152 attack
F2B blocked SSH bruteforcing
2019-12-01 18:18:01
62.96.54.212 attackspambots
Automatic report - Banned IP Access
2019-12-01 18:27:32
134.209.252.119 attackspambots
SSH bruteforce
2019-12-01 18:15:06
185.143.223.184 attackspam
2019-12-01T10:53:43.707500+01:00 lumpi kernel: [483984.164461] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.184 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=64095 PROTO=TCP SPT=56795 DPT=14235 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-01 18:17:20
125.71.215.213 attackspam
2019-12-01T06:17:19.977596hub.schaetter.us sshd\[15142\]: Invalid user flaatten from 125.71.215.213 port 60924
2019-12-01T06:17:19.987929hub.schaetter.us sshd\[15142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.71.215.213
2019-12-01T06:17:21.900371hub.schaetter.us sshd\[15142\]: Failed password for invalid user flaatten from 125.71.215.213 port 60924 ssh2
2019-12-01T06:26:02.900202hub.schaetter.us sshd\[15187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.71.215.213  user=sshd
2019-12-01T06:26:04.943307hub.schaetter.us sshd\[15187\]: Failed password for sshd from 125.71.215.213 port 37666 ssh2
...
2019-12-01 18:24:00
59.36.132.240 attack
Bad bot/spoofed identity
2019-12-01 18:08:44
45.82.153.80 attack
Nov 30 00:02:59 xzibhostname postfix/smtpd[11021]: connect from unknown[45.82.153.80]
Nov 30 00:03:05 xzibhostname postfix/smtpd[11021]: warning: unknown[45.82.153.80]: SASL LOGIN authentication failed: authentication failure
Nov 30 00:03:05 xzibhostname postfix/smtpd[11021]: lost connection after AUTH from unknown[45.82.153.80]
Nov 30 00:03:05 xzibhostname postfix/smtpd[11021]: disconnect from unknown[45.82.153.80]
Nov 30 00:03:05 xzibhostname postfix/smtpd[10085]: connect from unknown[45.82.153.80]
Nov 30 00:03:11 xzibhostname postfix/smtpd[10085]: warning: unknown[45.82.153.80]: SASL LOGIN authentication failed: authentication failure
Nov 30 00:03:12 xzibhostname postfix/smtpd[10085]: lost connection after AUTH from unknown[45.82.153.80]
Nov 30 00:03:12 xzibhostname postfix/smtpd[10085]: disconnect from unknown[45.82.153.80]
Nov 30 00:03:17 xzibhostname postfix/smtpd[11021]: connect from unknown[45.82.153.80]
Nov 30 00:03:26 xzibhostname postfix/smtpd[11021]: warning........
-------------------------------
2019-12-01 18:09:23
176.241.20.58 attackspam
POST /wp-login.php HTTP/1.1 200 1826 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-12-01 18:08:25
178.79.132.107 attackbotsspam
POST /wp-login.php HTTP/1.1 200 4226 wp-login.phpMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36
2019-12-01 18:05:18
129.250.206.86 attackspambots
UTC: 2019-11-30 pkts: 2 port: 123/udp
2019-12-01 18:23:44
37.220.176.38 attackbotsspam
Automatic report - Port Scan Attack
2019-12-01 18:10:05

Recently Reported IPs

5.56.157.196 153.142.191.111 92.234.161.15 31.235.96.195
178.195.61.240 73.112.62.165 122.223.109.95 167.99.224.160
141.152.33.108 201.76.6.107 52.74.199.95 37.2.109.67
180.47.155.34 220.7.189.18 191.20.134.225 70.211.129.236
68.180.0.155 75.1.3.108 97.1.240.101 54.145.57.190