Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.70.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.70.62.			IN	A

;; AUTHORITY SECTION:
.			259	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:45:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 62.70.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 62.70.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.43.108.138 attackspam
Dec  2 09:19:38 server sshd\[19943\]: Invalid user squid from 185.43.108.138
Dec  2 09:19:38 server sshd\[19943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.43.108.138 
Dec  2 09:19:41 server sshd\[19943\]: Failed password for invalid user squid from 185.43.108.138 port 38921 ssh2
Dec  2 09:29:39 server sshd\[23209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.43.108.138  user=root
Dec  2 09:29:41 server sshd\[23209\]: Failed password for root from 185.43.108.138 port 37918 ssh2
...
2019-12-02 15:40:33
104.168.151.39 attackbots
2019-12-02T07:32:41.391281abusebot-3.cloudsearch.cf sshd\[26472\]: Invalid user longhua_123456 from 104.168.151.39 port 35480
2019-12-02 15:39:08
61.7.253.197 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-02 15:51:29
200.7.121.19 attack
Honeypot attack, port: 23, PTR: 200-7-121-19.sunway.com.br.
2019-12-02 15:57:14
23.247.33.61 attackbotsspam
Dec  2 07:34:29 Ubuntu-1404-trusty-64-minimal sshd\[29698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.247.33.61  user=sync
Dec  2 07:34:30 Ubuntu-1404-trusty-64-minimal sshd\[29698\]: Failed password for sync from 23.247.33.61 port 35804 ssh2
Dec  2 07:44:36 Ubuntu-1404-trusty-64-minimal sshd\[6481\]: Invalid user info from 23.247.33.61
Dec  2 07:44:36 Ubuntu-1404-trusty-64-minimal sshd\[6481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.247.33.61
Dec  2 07:44:38 Ubuntu-1404-trusty-64-minimal sshd\[6481\]: Failed password for invalid user info from 23.247.33.61 port 59888 ssh2
2019-12-02 15:21:34
178.128.222.84 attackspam
Dec  2 08:41:15 legacy sshd[8257]: Failed password for root from 178.128.222.84 port 49434 ssh2
Dec  2 08:50:43 legacy sshd[8728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.222.84
Dec  2 08:50:46 legacy sshd[8728]: Failed password for invalid user mysql from 178.128.222.84 port 35340 ssh2
...
2019-12-02 15:59:27
51.158.103.85 attackspam
SSH Bruteforce attempt
2019-12-02 15:45:30
177.81.39.28 attack
Honeypot attack, port: 23, PTR: b151271c.virtua.com.br.
2019-12-02 15:36:15
183.95.84.34 attackspam
2019-12-02T07:54:54.802246abusebot-3.cloudsearch.cf sshd\[26687\]: Invalid user suwanawongse from 183.95.84.34 port 54484
2019-12-02 15:55:47
218.92.0.180 attackspambots
CyberHackers.eu > SSH Bruteforce attempt!
2019-12-02 15:56:41
118.96.24.11 attack
Honeypot attack, port: 445, PTR: 11.static.118-96-24.astinet.telkom.net.id.
2019-12-02 15:54:23
61.177.172.128 attackspam
v+ssh-bruteforce
2019-12-02 15:54:36
112.133.232.84 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-02 15:30:07
182.72.207.148 attackbots
2019-12-02T07:51:45.907258abusebot-3.cloudsearch.cf sshd\[26665\]: Invalid user restore from 182.72.207.148 port 39383
2019-12-02 15:56:02
104.236.250.88 attack
sshd jail - ssh hack attempt
2019-12-02 15:44:58

Recently Reported IPs

104.21.67.198 104.21.67.196 104.21.67.202 104.21.67.205
104.21.67.20 104.21.67.2 104.21.67.207 104.21.67.214
104.21.67.21 104.21.67.215 104.21.67.210 104.21.67.22
104.21.70.66 104.21.67.223 104.21.67.211 104.21.67.220
104.21.67.221 104.21.67.224 104.21.67.234 104.21.67.240