Loading...

70.59.126.222 is in Saint Paul, United States

70.59.126.222 is known for brute force, DNS cache poisoning, firewall alert, hacking, malware, spam.

The report has been created on Apr 28, 2017 20:46:09
The IP address 70.59.126.222 belongs to CenturyLink ISP in Saint Paul (Minnesota, MN), United States (44.9444007874 and -93.0932998657). The hostname is gw1.w3open.com.
United States (United States of America, USA) is a High income: OECD country in North America. The currency is U.S. dollar.
As of Apr 28, 2017 20:46:09 we have 18 complaint(s) about 70.59.126.222. Based on our records, the 70.59.126.222 has been involved in brute force, DNS cache poisoning, firewall alert, hacking, malware, spam, etc.

70.59.126.222

IP Address Country:  United States (US)
IP Address Region:MN Minnesota
IP Address City:Saint Paul
IP Postal Code
IP Address Area Code651
IP Metro Code613
IP Address Latitude:44.9444007874
IP Address Longitude:-93.0932998657
IP Address ISP: CenturyLink
Organisation:
IP Address Proxy:
IP Address Host:gw1.w3open.com
Map is loading...

If 70.59.126.222 is causing you trouble (doing SPAM, brute-force, DOS attack, phishing, or other fraud), you can report the abuser right here!



We have 18 complaints about 70.59.126.222

>2 months agoAttempt to Delete Sharepoint files - in Hacking
"Attempt to steal/delete sharepoint files. Have DLP records:

You're getting this message because there's activity in your Office 365 organization that matches the alert 'Delete/Access'.

Activity: FileAccessed
User: mark.cotton@solution7incorporate"

Anonymous user from 24.255.2.239 in United States
>10 months agoRAT - in Hacking
"I can't turn off my remote access or deny the remote connections. I did a little researching and believe it to be a RAT.
"

Anonymous user from 37.196.193.209 in Sweden
>11 months agohacking - in Hacking
"Several attempts to get access to process data several times during the morning on 30 / 5-16 at Swedish time"

Anonymous user from 187.189.240.184 in Mexico
>11 months agoRE: - in Malware
"I've been receiving emails with malware files, with different themes, such as:
"Dear ,
Please find attached a document containing our responses to the other points which we
discussed on Monday 23th May.
Please let me know if you have any queries ""

Anonymous user from 1.121.99.161 in Australia
>12 months agoMajor Spam Involving Woolworths Australia - in Spam
"Spam email offers a $500 Woolworths Food Voucher which is standard with Woolworths it then sucks you in to give your woolworths details and from that it gets you to do a yes / no of offers. Worried about personal data issued to them"

Anonymous user from 217.129.85.103 in Portugal
>1 year agoConstants attacks on our servers - in Brute Force
"Constants attacks on our servers
All kinds of attacks
These parasites do not stop at trying to attack our servers
Constants attacks on our servers
All kinds of attacks
They hide-over IP: 183.3.202.107 By china, ukraine..."

Anonymous user from 70.179.18.188 in United States
>1 year agoMultiple wp-admin login attempts - in Hacking
"This IP has tried to get into a WP site of mine using common usernames. Had to traceroute several ips to consistently find this one. "

Anonymous user from 38.103.221.19 in United States
>1 year agohacked by ex - in Hacking
"my ex boyfriend is hacking my phone with this up address. he has taken away my dns & has now taken my admin rights. what can i do to fix this?"
>1 year agoe-mail spammer - in Brute Force
"This IP has an originating IP sending SPAM voicemail with What's App notifications. The IP bounced via a Japanese IP which I suspect is a proxy based in Japan. Trace route shows they are based in the USA. "

Anonymous user from 78.193.198.249 in France
>1 year agoemail spoofing - in Spam
"hello
my adresse email it's beeing used by this ip adress to sent spam
what should i do

Hop Min Max Avg IP address Host Geo Information Latitude Longitude Distance
1 0.095 ms 0.146 ms 0.118 ms 70.59.126.222 gw1.w3open.com United States, Saint Pau"
>1 year agoRepeated attempt to hack in my PC (Czech Republic) - in Brute Force
"I am thick of attempts (unter guise of "skype.exe") to hack into my PC comming EACH TIME from Saint-Paul and using countless various IPs via different countries in the world. Please stop this stupid activity and spy enemies instead of friends!"
>1 year agoCriminal Activity Alert - in Brute Force
"Hello, I just traced this Little Red Wagon back to the sender and boy was I not surprised it's another dirt bag looking to profit off of Identity Theft more than likely, so this address needs checking out."

Anonymous user from 70.59.126.222 in United States
>1 year ago
"Guys.

it seems that this is associated to this Ips
Decimal IP Address: 172782660 ( http://172782660 )
IP Address: 10.76.116.68/31 ( 0x0A4C7444 )
Subnet Mask: 255.255.255.254 ( 0xFFFFFFFE )
Wildcard (Inverse) Mask: 0.0.0.1 ( 0x00000001 )
Netwo"

Anonymous user from 70.59.126.222 in United States
>1 year ago
"i am not using this ip number for god sake!"

Anonymous user from 98.210.24.225 in United States
>2 years agoCriminal Activity - in Brute Force
"Whoever owns this address has been trying to hack into my Google account. They try to disguise their IP address by bouncing through 8-10 other IP addresses, so you need to run traceroute to find this IP address. Whoever is doing this should be shot!"

Anonymous user from 66.176.39.198 in United States
>2 years agoLAN ACCESS - in DNS Cache Poisoning
"My router was accessed by this ip 183.60.48.25 from china a trace-route link it back to this ip 70.59.126.222 "

Anonymous user from 166.181.81.99 in United States
>2 years agoSPAM - in Spam
"0.172 ms 0.191 ms 0.183 ms 70.59.126.222 gw1.w3open.com United States, Saint Paul 44°94'44" N 93°09'33" W 15.48 km
196.348 ms 196.835 ms 196.581 ms 193.150.120.14 193.150.120.14 Russian Federation, - 60°00'00" N 100°00'00" E 8269.27 km
"

Anonymous user from 90.9.166.228 in France
>2 years agoDDos attack and brut force since more 3 Month - in Brute Force
"Trace route shows always same origin IP at St Paul, really fedUp, this hacker has attacked our three servers more than 200 hundred times, sometimes they have tried thousand of Wrong user and password other times they have stressed the whole netwo"

Anonymous user from 105.130.221.51 in Morocco
>3 years agohide ip - in Firewall Alert
"hi i must to hide my ip then i can register to a site of earning money cause they tell we already hhave your ip in our systeme"

Anonymous user from 203.97.239.33 in New Zealand
>3 years agohacking - in Firewall Alert
"this address appears a number of times in my router log always via other countries but sourced back to the same address.
requires checking out"

WHOIS for 70.59.126.222

[Querying whois.arin.net]
[whois.arin.net]

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#


#
# Query terms are ambiguous. The query is assumed to be:
# "n 70.59.126.222"
#
# Use "?" to get help.
#

#
# The following results may also be obtained via:
# http://whois.arin.net/rest/nets;q=70.59.126.222?showDetails=true&showARIN=false&ext=netref2
#

NetRange: 70.56.0.0 - 70.59.255.255
CIDR: 70.56.0.0/14
OriginAS:
NetName: QWEST-INET-117
NetHandle: NET-70-56-0-0-1
Parent: NET-70-0-0-0-0
NetType: Direct Allocation
RegDate: 2004-06-18
Updated: 2013-09-19
Ref: http://whois.arin.net/rest/net/NET-70-56-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2013-08-30
Ref: http://whois.arin.net/rest/org/QCC-18

OrgAbuseHandle: QIA2-ARIN
OrgAbuseName: Qwest Abuse
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@qwest.net
OrgAbuseRef: http://whois.arin.net/rest/poc/QIA2-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: http://whois.arin.net/rest/poc/QIA-ARIN

RNOCHandle: QIN-ARIN
RNOCName: Qwest IP NOC
RNOCPhone: +1-877-886-6515
RNOCEmail: support@qwestip.net
RNOCRef: http://whois.arin.net/rest/poc/QIN-ARIN

RTechHandle: QIA-ARIN
RTechName: Qwest IP Admin
RTechPhone: +1-877-886-6515
RTechEmail: ipadmin@centurylink.com
RTechRef: http://whois.arin.net/rest/poc/QIA-ARIN

RAbuseHandle: QIA2-ARIN
RAbuseName: Qwest Abuse
RAbusePhone: +1-877-886-6515
RAbuseEmail: abuse@qwest.net
RAbuseRef: http://whois.arin.net/rest/poc/QIA2-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#

Abusing IP Addresses from the same C block

IP AddressAbuseComplaints
70.59.126.200 complaints

Other Brute Force, DNS Cache Poisoning, Firewall Alert, Hacking, Malware, Spam Complaints

3 days  ago United States63.215.202.68"HackAttack: [SPI:Illegal connection state attack]"
3 days  ago United States65.52.108.74"HackAttack: [SPI:Illegal connection state attack]"
3 days  ago United States40.79.73.139" HackAttack: [SPI:Illegal connection state attack] "
3 days  ago United States13.107.6.151"HackAttack: [SPI:Illegal connection state attack]"
3 days  ago United States216.58.201.34"HackAttack: [SPI:Illegal connection state attack] "
3 days  ago 45.119.238.19"HackAttack: [SPI:Illegal connection state attack] "
3 days  ago India116.75.5.187"HackAttack: [SPI:Illegal connection state attack] "
3 days  ago United States54.76.130.181"HackAttack: [SPI:Illegal connection state attack]"
3 days  ago Argentina186.124.149.222"HackAttack: [SPI:Illegal connection state attack]"
3 days  ago United States96.236.224.125"HackAttack: [SPI:Illegal connection state attack]"