Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.70.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.70.8.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:49:13 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 8.70.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.70.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.105.139.105 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-24 03:38:16
116.72.227.153 attackbotsspam
Automatic report - Port Scan Attack
2019-10-24 03:15:45
35.240.189.61 attack
fail2ban honeypot
2019-10-24 03:26:34
149.56.13.142 attack
Automatic report - XMLRPC Attack
2019-10-24 03:34:41
218.92.0.137 attack
Oct 23 16:44:26 OPSO sshd\[19814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.137  user=root
Oct 23 16:44:28 OPSO sshd\[19814\]: Failed password for root from 218.92.0.137 port 35525 ssh2
Oct 23 16:44:31 OPSO sshd\[19814\]: Failed password for root from 218.92.0.137 port 35525 ssh2
Oct 23 16:44:34 OPSO sshd\[19814\]: Failed password for root from 218.92.0.137 port 35525 ssh2
Oct 23 16:44:36 OPSO sshd\[19814\]: Failed password for root from 218.92.0.137 port 35525 ssh2
2019-10-24 03:09:44
118.25.214.4 attack
Oct 23 11:03:09 plusreed sshd[24315]: Invalid user Bedienung2017 from 118.25.214.4
...
2019-10-24 03:13:12
149.56.45.87 attackspam
Oct 23 10:21:09 TORMINT sshd\[16314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.45.87  user=root
Oct 23 10:21:11 TORMINT sshd\[16314\]: Failed password for root from 149.56.45.87 port 55898 ssh2
Oct 23 10:25:16 TORMINT sshd\[16610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.45.87  user=root
...
2019-10-24 03:03:46
118.24.38.12 attackspambots
2019-10-23T17:53:30.396506abusebot-5.cloudsearch.cf sshd\[7598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.38.12  user=root
2019-10-24 03:04:39
136.35.179.18 attackspam
SSH Scan
2019-10-24 03:33:37
179.24.200.3 attackbots
SSH Scan
2019-10-24 03:03:15
193.188.22.81 attack
Brute forcing RDP port 3389
2019-10-24 03:10:33
106.201.232.67 attackspambots
Port 1433 Scan
2019-10-24 03:23:36
70.52.179.147 attackspambots
SSH Scan
2019-10-24 03:09:15
216.218.206.77 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 03:37:52
61.53.108.122 attackbots
SSH Scan
2019-10-24 03:24:44

Recently Reported IPs

104.21.70.76 104.21.70.77 104.21.70.83 104.21.70.71
104.21.70.90 104.21.70.94 104.21.70.97 104.21.70.95
104.21.71.161 104.21.71.10 104.21.71.101 104.21.71.105
104.21.71.106 104.21.71.11 104.21.71.114 104.21.71.112
104.21.71.117 104.21.71.165 104.21.71.122 104.21.71.118