Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.70.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.70.238.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:43:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 238.70.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 238.70.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
43.242.135.130 attackbotsspam
Oct  9 15:38:35 vps647732 sshd[5702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.242.135.130
Oct  9 15:38:37 vps647732 sshd[5702]: Failed password for invalid user Porn123 from 43.242.135.130 port 40954 ssh2
...
2019-10-09 21:43:56
106.43.40.66 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/106.43.40.66/ 
 CN - 1H : (510)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 106.43.40.66 
 
 CIDR : 106.43.0.0/16 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 WYKRYTE ATAKI Z ASN4134 :  
  1H - 13 
  3H - 30 
  6H - 63 
 12H - 113 
 24H - 216 
 
 DateTime : 2019-10-09 13:39:36 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-09 21:33:38
118.24.34.19 attackbots
fail2ban
2019-10-09 21:42:08
186.232.160.246 attack
Mail sent to address hacked/leaked from atari.st
2019-10-09 21:21:39
208.115.237.94 attackspambots
\[2019-10-09 09:12:50\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T09:12:50.671-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46812420841",SessionID="0x7fc3ac5226d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/208.115.237.94/61058",ACLName="no_extension_match"
\[2019-10-09 09:13:11\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T09:13:11.299-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0046812420841",SessionID="0x7fc3ac00c388",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/208.115.237.94/57346",ACLName="no_extension_match"
\[2019-10-09 09:13:31\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T09:13:31.315-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="701146812420841",SessionID="0x7fc3acd9a8d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/208.115.237.94/54832",ACLName="no_extens
2019-10-09 21:24:23
123.108.50.205 attack
Unauthorised access (Oct  9) SRC=123.108.50.205 LEN=40 PREC=0x20 TTL=240 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2019-10-09 21:26:27
49.235.173.155 attackspam
Oct  9 14:56:51 localhost sshd\[1268\]: Invalid user qwerty@123 from 49.235.173.155 port 43840
Oct  9 14:56:51 localhost sshd\[1268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.173.155
Oct  9 14:56:54 localhost sshd\[1268\]: Failed password for invalid user qwerty@123 from 49.235.173.155 port 43840 ssh2
2019-10-09 21:15:51
192.163.224.116 attackspambots
Oct  9 15:26:32 vps01 sshd[32144]: Failed password for root from 192.163.224.116 port 43192 ssh2
2019-10-09 21:33:14
93.173.6.132 attack
Automatic report - Port Scan Attack
2019-10-09 21:52:30
188.166.34.129 attackspam
Oct  9 15:09:13 dedicated sshd[23103]: Invalid user Science123 from 188.166.34.129 port 35108
2019-10-09 21:19:55
199.191.58.202 attack
Automatic report - XMLRPC Attack
2019-10-09 21:25:40
81.171.85.146 attackbotsspam
\[2019-10-09 09:27:07\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '81.171.85.146:58748' - Wrong password
\[2019-10-09 09:27:07\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-09T09:27:07.842-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1879",SessionID="0x7fc3ad328138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85.146/58748",Challenge="615df806",ReceivedChallenge="615df806",ReceivedHash="dbfddebed8be98aa1ebbc968b5c8eebe"
\[2019-10-09 09:27:36\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '81.171.85.146:53108' - Wrong password
\[2019-10-09 09:27:36\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-09T09:27:36.951-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4373",SessionID="0x7fc3acd9a8d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85
2019-10-09 21:30:10
118.24.82.164 attackspam
Oct  9 18:37:14 areeb-Workstation sshd[29264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.82.164
Oct  9 18:37:17 areeb-Workstation sshd[29264]: Failed password for invalid user cent0s2016 from 118.24.82.164 port 34542 ssh2
...
2019-10-09 21:21:07
178.128.183.90 attackspam
Oct  9 14:14:42 microserver sshd[21307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.183.90  user=root
Oct  9 14:14:44 microserver sshd[21307]: Failed password for root from 178.128.183.90 port 40890 ssh2
Oct  9 14:18:57 microserver sshd[21925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.183.90  user=root
Oct  9 14:18:59 microserver sshd[21925]: Failed password for root from 178.128.183.90 port 52656 ssh2
Oct  9 14:23:16 microserver sshd[22579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.183.90  user=root
Oct  9 14:35:53 microserver sshd[24443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.183.90  user=root
Oct  9 14:35:55 microserver sshd[24443]: Failed password for root from 178.128.183.90 port 43264 ssh2
Oct  9 14:40:09 microserver sshd[24890]: pam_unix(sshd:auth): authentication failure; logname= uid
2019-10-09 21:14:55
200.146.232.97 attackbotsspam
2019-10-09T13:21:33.969605abusebot-7.cloudsearch.cf sshd\[24002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97  user=root
2019-10-09 21:52:52

Recently Reported IPs

104.21.64.201 104.21.64.202 104.21.64.207 104.21.64.21
104.21.64.214 104.21.64.213 104.21.64.208 104.21.64.220
104.21.64.223 104.21.64.22 104.21.70.24 104.21.64.23
104.21.64.228 104.21.64.235 104.21.64.238 104.21.64.237
104.21.64.24 104.21.64.239 104.21.64.244 104.21.64.245