Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.129.70.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.129.70.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:33:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
20.70.129.74.in-addr.arpa domain name pointer syn-074-129-070-020.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.70.129.74.in-addr.arpa	name = syn-074-129-070-020.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.188.10.198 attackspam
Automatic report - Port Scan Attack
2019-11-18 07:16:36
87.98.164.154 attack
fire
2019-11-18 06:46:56
218.245.5.44 attack
Fail2Ban Ban Triggered
2019-11-18 07:06:41
23.94.122.108 attackbots
Unauthorised access (Nov 18) SRC=23.94.122.108 LEN=40 TTL=244 ID=5769 TCP DPT=1433 WINDOW=1024 SYN
2019-11-18 06:54:48
49.88.112.116 attackbots
Nov 17 23:44:57 localhost sshd\[20825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Nov 17 23:44:59 localhost sshd\[20825\]: Failed password for root from 49.88.112.116 port 18824 ssh2
Nov 17 23:45:01 localhost sshd\[20825\]: Failed password for root from 49.88.112.116 port 18824 ssh2
2019-11-18 06:52:08
125.44.211.175 attackbots
port scan and connect, tcp 23 (telnet)
2019-11-18 07:14:29
187.138.153.111 attackbotsspam
Automatic report - Port Scan Attack
2019-11-18 07:21:06
70.50.164.49 attack
fire
2019-11-18 07:22:50
74.66.94.83 attackbotsspam
fire
2019-11-18 07:12:18
125.212.217.214 attackbotsspam
125.212.217.214 was recorded 5 times by 4 hosts attempting to connect to the following ports: 2211,6352,4747,7778,3098. Incident counter (4h, 24h, all-time): 5, 32, 334
2019-11-18 07:14:00
54.83.5.238 attackspambots
404 NOT FOUND
2019-11-18 06:50:02
83.222.189.246 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-11-18 07:19:00
73.214.82.178 attackbotsspam
fire
2019-11-18 07:13:44
61.186.219.33 attack
FTP brute force
...
2019-11-18 07:09:47
222.186.42.4 attackbotsspam
Nov 17 23:45:03 localhost sshd\[20842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Nov 17 23:45:06 localhost sshd\[20842\]: Failed password for root from 222.186.42.4 port 63530 ssh2
Nov 17 23:45:09 localhost sshd\[20842\]: Failed password for root from 222.186.42.4 port 63530 ssh2
2019-11-18 06:47:21

Recently Reported IPs

227.176.145.31 193.8.134.144 47.226.171.76 199.186.160.3
133.72.181.103 67.26.181.220 213.156.78.104 247.225.128.222
134.113.140.231 3.209.62.197 38.228.26.17 135.251.153.80
198.129.194.72 227.79.0.145 186.241.212.100 64.93.188.71
70.185.247.41 44.3.69.34 79.171.67.106 207.46.133.74