Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.164.122.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.164.122.70.			IN	A

;; AUTHORITY SECTION:
.			279	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 11:10:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 70.122.164.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.122.164.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.47.62.124 attackbots
Brute forcing email accounts
2020-05-25 03:44:11
112.85.64.15 attack
Spam
2020-05-25 03:29:18
185.220.101.207 attackbotsspam
 TCP (SYN) 185.220.101.207:5406 -> port 1080, len 52
2020-05-25 03:40:23
179.179.234.250 attackspambots
Automatic report - Port Scan Attack
2020-05-25 03:48:39
40.115.247.138 attackspam
May 24 20:54:22 vps647732 sshd[21415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.115.247.138
May 24 20:54:24 vps647732 sshd[21415]: Failed password for invalid user jkamende from 40.115.247.138 port 56594 ssh2
...
2020-05-25 03:51:17
113.179.80.254 attackbots
Email rejected due to spam filtering
2020-05-25 03:28:47
117.50.13.29 attackspam
May 24 21:14:09 pve1 sshd[32701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.13.29 
May 24 21:14:12 pve1 sshd[32701]: Failed password for invalid user server from 117.50.13.29 port 55948 ssh2
...
2020-05-25 03:36:34
200.90.110.65 attackspambots
Port probing on unauthorized port 445
2020-05-25 03:14:43
59.63.215.209 attackbots
2020-05-24T21:20:59.392717amanda2.illicoweb.com sshd\[16228\]: Failed password for root from 59.63.215.209 port 55140 ssh2
2020-05-24T21:24:41.905931amanda2.illicoweb.com sshd\[16347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.215.209  user=root
2020-05-24T21:24:44.648839amanda2.illicoweb.com sshd\[16347\]: Failed password for root from 59.63.215.209 port 53936 ssh2
2020-05-24T21:28:14.652082amanda2.illicoweb.com sshd\[16476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.215.209  user=root
2020-05-24T21:28:16.301185amanda2.illicoweb.com sshd\[16476\]: Failed password for root from 59.63.215.209 port 52734 ssh2
...
2020-05-25 03:54:08
218.92.0.204 attackbots
2020-05-24T15:12:43.949320xentho-1 sshd[702582]: Failed password for root from 218.92.0.204 port 57235 ssh2
2020-05-24T15:12:41.716121xentho-1 sshd[702582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2020-05-24T15:12:43.949320xentho-1 sshd[702582]: Failed password for root from 218.92.0.204 port 57235 ssh2
2020-05-24T15:12:47.259149xentho-1 sshd[702582]: Failed password for root from 218.92.0.204 port 57235 ssh2
2020-05-24T15:12:41.716121xentho-1 sshd[702582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2020-05-24T15:12:43.949320xentho-1 sshd[702582]: Failed password for root from 218.92.0.204 port 57235 ssh2
2020-05-24T15:12:47.259149xentho-1 sshd[702582]: Failed password for root from 218.92.0.204 port 57235 ssh2
2020-05-24T15:12:50.440776xentho-1 sshd[702582]: Failed password for root from 218.92.0.204 port 57235 ssh2
2020-05-24T15:14:55.418544xent
...
2020-05-25 03:36:22
89.248.168.176 attackspam
 TCP (SYN) 89.248.168.176:38600 -> port 40889, len 44
2020-05-25 03:43:29
107.158.163.141 attackbotsspam
Spam
2020-05-25 03:29:46
94.224.255.143 attackspam
Automatic report - Banned IP Access
2020-05-25 03:37:26
98.100.250.202 attackbotsspam
May 24 18:17:08 localhost sshd\[29535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.100.250.202  user=root
May 24 18:17:10 localhost sshd\[29535\]: Failed password for root from 98.100.250.202 port 49524 ssh2
May 24 18:22:24 localhost sshd\[29639\]: Invalid user sjulstok from 98.100.250.202 port 41454
...
2020-05-25 03:45:08
190.147.33.171 attackspam
May 24 14:07:22  sshd\[18898\]: Invalid user courtney from 190.147.33.171May 24 14:07:24  sshd\[18898\]: Failed password for invalid user courtney from 190.147.33.171 port 55560 ssh2
...
2020-05-25 03:52:34

Recently Reported IPs

104.164.122.69 104.164.122.71 104.164.122.72 104.164.122.73
104.164.122.74 104.164.122.75 104.164.122.76 104.164.122.78
104.164.122.79 104.164.122.81 104.164.122.82 104.164.122.83
104.164.122.84 104.164.122.85 104.164.122.86 104.164.122.87
104.164.122.88 104.164.122.89 104.164.122.90 233.74.89.113