Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.2.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.107.2.70.			IN	A

;; AUTHORITY SECTION:
.			259	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022100 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:13:42 CST 2022
;; MSG SIZE  rcvd: 105
Host info
70.2.107.104.in-addr.arpa domain name pointer a104-107-2-70.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.2.107.104.in-addr.arpa	name = a104-107-2-70.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.21.124 attack
Oct 22 16:35:09 vps01 sshd[30619]: Failed password for root from 106.12.21.124 port 59968 ssh2
Oct 22 16:40:57 vps01 sshd[30699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.21.124
2019-10-23 01:33:28
41.109.186.33 attack
Brute force attempt
2019-10-23 01:30:21
118.122.196.104 attack
Unauthorized SSH login attempts
2019-10-23 01:07:16
190.40.199.134 attackspam
2019-10-21 x@x
2019-10-21 09:03:17 unexpected disconnection while reading SMTP command from ([190.40.199.134]) [190.40.199.134]:44058 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.40.199.134
2019-10-23 01:19:39
128.199.157.28 attackbots
Oct 22 13:59:44 tux-35-217 sshd\[24260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.157.28  user=root
Oct 22 13:59:47 tux-35-217 sshd\[24260\]: Failed password for root from 128.199.157.28 port 41381 ssh2
Oct 22 14:00:41 tux-35-217 sshd\[24273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.157.28  user=root
Oct 22 14:00:43 tux-35-217 sshd\[24273\]: Failed password for root from 128.199.157.28 port 33958 ssh2
...
2019-10-23 01:22:19
116.105.35.179 attackspam
2019-10-21 x@x
2019-10-21 10:13:48 unexpected disconnection while reading SMTP command from ([116.105.35.179]) [116.105.35.179]:13315 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.105.35.179
2019-10-23 01:11:29
124.95.129.102 attackspam
Fail2Ban Ban Triggered
2019-10-23 01:01:12
195.3.147.47 attack
Oct 22 18:03:22 herz-der-gamer sshd[414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.3.147.47  user=root
Oct 22 18:03:23 herz-der-gamer sshd[414]: Failed password for root from 195.3.147.47 port 21577 ssh2
...
2019-10-23 01:01:44
103.205.68.2 attack
Oct 22 18:52:47 [host] sshd[20008]: Invalid user download from 103.205.68.2
Oct 22 18:52:47 [host] sshd[20008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2
Oct 22 18:52:49 [host] sshd[20008]: Failed password for invalid user download from 103.205.68.2 port 60372 ssh2
2019-10-23 01:24:01
185.100.85.61 attack
Oct 22 13:46:56 vpn01 sshd[4834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.85.61
Oct 22 13:46:59 vpn01 sshd[4834]: Failed password for invalid user admin from 185.100.85.61 port 54194 ssh2
...
2019-10-23 00:49:53
83.171.120.210 attackbots
Unauthorised access (Oct 22) SRC=83.171.120.210 LEN=52 TTL=117 ID=21383 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-23 01:09:53
128.14.136.158 attackbotsspam
Oct 22 16:50:33 vpn01 sshd[10558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.136.158
Oct 22 16:50:36 vpn01 sshd[10558]: Failed password for invalid user admin from 128.14.136.158 port 45738 ssh2
...
2019-10-23 01:12:32
112.175.150.13 attackbots
Oct 22 19:54:46 server sshd\[24763\]: User root from 112.175.150.13 not allowed because listed in DenyUsers
Oct 22 19:54:46 server sshd\[24763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.175.150.13  user=root
Oct 22 19:54:48 server sshd\[24763\]: Failed password for invalid user root from 112.175.150.13 port 60014 ssh2
Oct 22 19:59:40 server sshd\[23943\]: Invalid user h from 112.175.150.13 port 51341
Oct 22 19:59:40 server sshd\[23943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.175.150.13
2019-10-23 01:16:09
188.166.239.113 attackbots
Attempt to run wp-login.php
2019-10-23 00:50:36
182.61.136.53 attackbotsspam
Unauthorized SSH login attempts
2019-10-23 01:14:34

Recently Reported IPs

104.107.2.51 104.107.4.174 104.107.4.18 104.107.4.19
104.107.4.24 104.107.4.73 104.107.6.192 104.107.8.200
104.107.8.84 104.107.9.150 104.107.9.231 101.108.93.91
104.112.16.82 104.112.30.13 104.112.30.17 104.112.35.122
104.117.38.236 104.117.39.13 104.117.44.46 104.117.48.48