Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.253.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.253.70.			IN	A

;; AUTHORITY SECTION:
.			347	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 18:29:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 70.253.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.253.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.208.202 attack
Aug 23 22:42:58 MK-Soft-VM4 sshd\[13424\]: Invalid user post1 from 106.12.208.202 port 50562
Aug 23 22:42:58 MK-Soft-VM4 sshd\[13424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.202
Aug 23 22:43:00 MK-Soft-VM4 sshd\[13424\]: Failed password for invalid user post1 from 106.12.208.202 port 50562 ssh2
...
2019-08-24 07:27:38
200.196.249.170 attackbotsspam
2019-08-23T23:08:15.992925abusebot-2.cloudsearch.cf sshd\[29035\]: Invalid user abc1 from 200.196.249.170 port 53352
2019-08-24 07:30:34
137.74.176.208 attack
Aug 23 11:57:08 kapalua sshd\[7296\]: Invalid user ts3 from 137.74.176.208
Aug 23 11:57:08 kapalua sshd\[7296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip208.ip-137-74-176.eu
Aug 23 11:57:10 kapalua sshd\[7296\]: Failed password for invalid user ts3 from 137.74.176.208 port 3884 ssh2
Aug 23 12:01:19 kapalua sshd\[7635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip208.ip-137-74-176.eu  user=root
Aug 23 12:01:22 kapalua sshd\[7635\]: Failed password for root from 137.74.176.208 port 60593 ssh2
2019-08-24 07:37:03
41.76.209.14 attack
Aug 24 01:25:40 vps647732 sshd[11213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.209.14
Aug 24 01:25:43 vps647732 sshd[11213]: Failed password for invalid user dodsserver from 41.76.209.14 port 37060 ssh2
...
2019-08-24 07:46:11
103.28.243.54 attack
Automatic report - Port Scan Attack
2019-08-24 07:38:30
77.87.103.182 attackbotsspam
445/tcp
[2019-08-23]1pkt
2019-08-24 07:44:54
152.136.76.134 attackbotsspam
Invalid user ales from 152.136.76.134 port 40219
2019-08-24 08:00:54
177.73.70.218 attackspambots
Aug 23 18:14:56 vps01 sshd[28431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.73.70.218
Aug 23 18:14:58 vps01 sshd[28431]: Failed password for invalid user luc from 177.73.70.218 port 57033 ssh2
2019-08-24 07:43:56
5.189.145.24 attackspam
Fail2Ban Ban Triggered
2019-08-24 07:25:39
176.221.122.246 attackspambots
2019-08-23 17:02:06 H=(host-176-221-122-246.dynamic.mm.pl) [176.221.122.246]:20410 I=[10.100.18.25]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=176.221.122.246)
2019-08-23 17:02:07 unexpected disconnection while reading SMTP command from (host-176-221-122-246.dynamic.mm.pl) [176.221.122.246]:20410 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-08-23 17:29:51 H=(host-176-221-122-246.dynamic.mm.pl) [176.221.122.246]:34143 I=[10.100.18.25]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=176.221.122.246)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.221.122.246
2019-08-24 07:45:20
138.197.143.221 attack
$f2bV_matches
2019-08-24 07:31:51
165.22.10.8 attack
2019-08-24T03:50:44.366450enmeeting.mahidol.ac.th sshd\[29199\]: Invalid user ubnt from 165.22.10.8 port 46204
2019-08-24T03:50:44.385966enmeeting.mahidol.ac.th sshd\[29199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.10.8
2019-08-24T03:50:46.407356enmeeting.mahidol.ac.th sshd\[29199\]: Failed password for invalid user ubnt from 165.22.10.8 port 46204 ssh2
...
2019-08-24 07:59:37
118.24.82.164 attackspam
Aug 23 18:39:02 raspberrypi sshd\[7369\]: Invalid user china from 118.24.82.164Aug 23 18:39:04 raspberrypi sshd\[7369\]: Failed password for invalid user china from 118.24.82.164 port 60752 ssh2Aug 23 18:47:38 raspberrypi sshd\[7930\]: Failed password for root from 118.24.82.164 port 43196 ssh2
...
2019-08-24 08:04:38
51.38.80.173 attack
Aug 24 01:47:07 SilenceServices sshd[23793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.80.173
Aug 24 01:47:09 SilenceServices sshd[23793]: Failed password for invalid user cms from 51.38.80.173 port 48460 ssh2
Aug 24 01:51:08 SilenceServices sshd[30352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.80.173
2019-08-24 08:02:20
113.237.167.220 attackbotsspam
5500/tcp
[2019-08-23]1pkt
2019-08-24 07:50:24

Recently Reported IPs

104.19.253.121 248.54.234.115 104.19.3.135 104.19.34.118
104.19.35.50 213.119.196.214 104.19.37.158 255.72.84.166
210.140.130.100 104.19.44.243 255.59.138.88 104.19.45.248
104.19.47.78 104.19.5.18 104.19.58.209 104.19.65.143
104.19.7.230 104.19.85.212 104.19.92.35 104.19.96.1