Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.5.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6408
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.5.70.			IN	A

;; AUTHORITY SECTION:
.			246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:27:36 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 70.5.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.5.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.22.33.32 attackspam
Sep  6 23:47:32 django-0 sshd[30904]: Invalid user nfsnobod from 165.22.33.32
...
2020-09-07 08:24:09
154.237.65.36 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 08:50:53
192.144.215.146 attackbots
2020-09-06T22:47:53.967774paragon sshd[178854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.215.146
2020-09-06T22:47:53.964570paragon sshd[178854]: Invalid user www02 from 192.144.215.146 port 40630
2020-09-06T22:47:56.187883paragon sshd[178854]: Failed password for invalid user www02 from 192.144.215.146 port 40630 ssh2
2020-09-06T22:50:28.741846paragon sshd[178891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.215.146  user=root
2020-09-06T22:50:30.237036paragon sshd[178891]: Failed password for root from 192.144.215.146 port 47936 ssh2
...
2020-09-07 08:17:13
77.222.117.61 attack
Honeypot attack, port: 445, PTR: pool-77-222-117-61.is74.ru.
2020-09-07 08:15:33
58.69.16.206 attack
Honeypot attack, port: 445, PTR: 58.69.16.206.pldt.net.
2020-09-07 08:28:47
104.131.118.160 attackspambots
Sep  2 01:42:33 bbl sshd[30823]: Did not receive identification string from 104.131.118.160 port 51928
Sep  2 01:43:20 bbl sshd[3577]: Received disconnect from 104.131.118.160 port 49256:11: Normal Shutdown, Thank you for playing [preauth]
Sep  2 01:43:20 bbl sshd[3577]: Disconnected from 104.131.118.160 port 49256 [preauth]
Sep  2 01:43:43 bbl sshd[6163]: Invalid user ftpuser from 104.131.118.160 port 44062
Sep  2 01:43:43 bbl sshd[6163]: Received disconnect from 104.131.118.160 port 44062:11: Normal Shutdown, Thank you for playing [preauth]
Sep  2 01:43:43 bbl sshd[6163]: Disconnected from 104.131.118.160 port 44062 [preauth]
Sep  2 01:44:07 bbl sshd[8872]: Invalid user ghostname from 104.131.118.160 port 38862
Sep  2 01:44:07 bbl sshd[8872]: Received disconnect from 104.131.118.160 port 38862:11: Normal Shutdown, Thank you for playing [preauth]
Sep  2 01:44:07 bbl sshd[8872]: Disconnected from 104.131.118.160 port 38862 [preauth]
Sep  2 01:44:31 bbl sshd[12270]: Inva........
-------------------------------
2020-09-07 08:22:56
194.26.27.142 attack
Multiport scan : 17 ports scanned 3369 3379 3380 3382 3383 3384 3386 3387 3390 3391 3392 3394 3396 3398 3399 13389 23389
2020-09-07 08:35:00
123.30.249.49 attackbotsspam
Sep  7 02:49:09 itv-usvr-02 sshd[9409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.49  user=root
Sep  7 02:53:25 itv-usvr-02 sshd[9591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.49  user=root
Sep  7 02:57:32 itv-usvr-02 sshd[9738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.49  user=root
2020-09-07 08:14:50
91.229.112.12 attackspam
[Mon Aug 17 22:20:47 2020] - DDoS Attack From IP: 91.229.112.12 Port: 45819
2020-09-07 08:48:46
42.113.60.241 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 08:39:49
104.131.15.189 attack
2020-09-07T00:30:29.676854amanda2.illicoweb.com sshd\[46851\]: Invalid user admin from 104.131.15.189 port 51793
2020-09-07T00:30:29.679729amanda2.illicoweb.com sshd\[46851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gcore.io
2020-09-07T00:30:31.445078amanda2.illicoweb.com sshd\[46851\]: Failed password for invalid user admin from 104.131.15.189 port 51793 ssh2
2020-09-07T00:37:06.502877amanda2.illicoweb.com sshd\[47293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gcore.io  user=root
2020-09-07T00:37:08.769963amanda2.illicoweb.com sshd\[47293\]: Failed password for root from 104.131.15.189 port 57667 ssh2
...
2020-09-07 08:48:22
189.203.149.187 attack
1599411007 - 09/06/2020 18:50:07 Host: 189.203.149.187/189.203.149.187 Port: 445 TCP Blocked
2020-09-07 08:40:23
106.12.212.100 attackspambots
SSH brute force
2020-09-07 08:52:05
106.54.128.79 attack
invalid user napsugar from 106.54.128.79 port 54918 ssh2
2020-09-07 08:52:22
180.158.1.21 attackspambots
2020-09-06T22:41:54.915113paragon sshd[178728]: Failed password for root from 180.158.1.21 port 2158 ssh2
2020-09-06T22:44:16.846523paragon sshd[178800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.158.1.21  user=root
2020-09-06T22:44:18.940285paragon sshd[178800]: Failed password for root from 180.158.1.21 port 2159 ssh2
2020-09-06T22:46:40.890592paragon sshd[178827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.158.1.21  user=root
2020-09-06T22:46:42.753173paragon sshd[178827]: Failed password for root from 180.158.1.21 port 2160 ssh2
...
2020-09-07 08:30:25

Recently Reported IPs

104.21.5.7 104.21.5.72 104.21.5.73 104.21.5.74
104.21.5.78 153.210.124.144 104.21.5.8 104.21.5.80
104.21.5.81 104.21.5.82 104.21.5.83 104.21.5.87
104.21.5.89 109.116.252.105 104.21.5.91 104.21.5.95
104.21.5.96 161.21.121.94 104.21.5.98 104.21.5.99