Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.70.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.70.102.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:44:17 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 102.70.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 102.70.22.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.229.120.90 attackspambots
Sep  9 21:23:52 debian sshd\[15244\]: Invalid user vmadmin from 202.229.120.90 port 59266
Sep  9 21:23:52 debian sshd\[15244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.229.120.90
Sep  9 21:23:54 debian sshd\[15244\]: Failed password for invalid user vmadmin from 202.229.120.90 port 59266 ssh2
...
2019-09-10 09:31:09
192.227.252.2 attack
SSH bruteforce (Triggered fail2ban)
2019-09-10 09:18:26
52.60.189.115 attackspam
Wordpress attack
2019-09-10 08:55:47
117.255.216.106 attackspam
Sep  9 15:16:57 sachi sshd\[13535\]: Invalid user nagios from 117.255.216.106
Sep  9 15:16:57 sachi sshd\[13535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.255.216.106
Sep  9 15:16:59 sachi sshd\[13535\]: Failed password for invalid user nagios from 117.255.216.106 port 64887 ssh2
Sep  9 15:23:51 sachi sshd\[14123\]: Invalid user test1 from 117.255.216.106
Sep  9 15:23:51 sachi sshd\[14123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.255.216.106
2019-09-10 09:32:46
117.50.20.112 attackbotsspam
Sep 10 05:47:24 lcl-usvr-02 sshd[6746]: Invalid user test from 117.50.20.112 port 60162
Sep 10 05:47:24 lcl-usvr-02 sshd[6746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.20.112
Sep 10 05:47:24 lcl-usvr-02 sshd[6746]: Invalid user test from 117.50.20.112 port 60162
Sep 10 05:47:25 lcl-usvr-02 sshd[6746]: Failed password for invalid user test from 117.50.20.112 port 60162 ssh2
Sep 10 05:57:07 lcl-usvr-02 sshd[8896]: Invalid user testuser from 117.50.20.112 port 38420
...
2019-09-10 08:47:53
185.73.113.89 attack
Sep  9 14:48:42 php1 sshd\[17442\]: Invalid user teamspeak from 185.73.113.89
Sep  9 14:48:42 php1 sshd\[17442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185-73-113-89.nrp.co
Sep  9 14:48:44 php1 sshd\[17442\]: Failed password for invalid user teamspeak from 185.73.113.89 port 38646 ssh2
Sep  9 14:54:01 php1 sshd\[18078\]: Invalid user ftp_user from 185.73.113.89
Sep  9 14:54:01 php1 sshd\[18078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185-73-113-89.nrp.co
2019-09-10 09:06:13
187.190.236.88 attack
Sep  9 14:52:04 tdfoods sshd\[20415\]: Invalid user user from 187.190.236.88
Sep  9 14:52:04 tdfoods sshd\[20415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-190-236-88.totalplay.net
Sep  9 14:52:06 tdfoods sshd\[20415\]: Failed password for invalid user user from 187.190.236.88 port 23214 ssh2
Sep  9 14:58:06 tdfoods sshd\[21039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-190-236-88.totalplay.net  user=root
Sep  9 14:58:07 tdfoods sshd\[21039\]: Failed password for root from 187.190.236.88 port 53062 ssh2
2019-09-10 08:59:34
49.88.112.80 attackbotsspam
Sep  9 14:58:07 sachi sshd\[11557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.80  user=root
Sep  9 14:58:09 sachi sshd\[11557\]: Failed password for root from 49.88.112.80 port 51935 ssh2
Sep  9 14:58:14 sachi sshd\[11574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.80  user=root
Sep  9 14:58:16 sachi sshd\[11574\]: Failed password for root from 49.88.112.80 port 55486 ssh2
Sep  9 14:58:18 sachi sshd\[11574\]: Failed password for root from 49.88.112.80 port 55486 ssh2
2019-09-10 08:59:01
81.28.167.30 attack
Sep 10 03:11:22 h2177944 sshd\[17069\]: Invalid user test01 from 81.28.167.30 port 54414
Sep 10 03:11:22 h2177944 sshd\[17069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.28.167.30
Sep 10 03:11:25 h2177944 sshd\[17069\]: Failed password for invalid user test01 from 81.28.167.30 port 54414 ssh2
Sep 10 03:23:59 h2177944 sshd\[17634\]: Invalid user sinusbot1 from 81.28.167.30 port 57146
Sep 10 03:23:59 h2177944 sshd\[17634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.28.167.30
...
2019-09-10 09:26:44
54.38.184.10 attackbotsspam
Fail2Ban Ban Triggered
2019-09-10 09:09:00
200.107.154.40 attack
Sep 10 03:21:39 localhost sshd\[21892\]: Invalid user miusuario from 200.107.154.40 port 41287
Sep 10 03:21:39 localhost sshd\[21892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.40
Sep 10 03:21:41 localhost sshd\[21892\]: Failed password for invalid user miusuario from 200.107.154.40 port 41287 ssh2
2019-09-10 09:23:47
186.228.60.22 attackspambots
Sep 10 04:23:40 www5 sshd\[1302\]: Invalid user tom from 186.228.60.22
Sep 10 04:23:40 www5 sshd\[1302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.228.60.22
Sep 10 04:23:42 www5 sshd\[1302\]: Failed password for invalid user tom from 186.228.60.22 port 57886 ssh2
...
2019-09-10 09:37:22
159.89.194.103 attack
Sep 10 03:31:51 root sshd[23855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103 
Sep 10 03:31:53 root sshd[23855]: Failed password for invalid user postgres123 from 159.89.194.103 port 46050 ssh2
Sep 10 03:38:29 root sshd[23891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103 
...
2019-09-10 09:39:42
189.211.207.162 attackspam
Automatic report - Port Scan Attack
2019-09-10 08:58:07
45.136.109.171 attackspambots
Sep  9 18:14:59 mc1 kernel: \[596271.162887\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.171 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=10164 PROTO=TCP SPT=56863 DPT=3337 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  9 18:17:18 mc1 kernel: \[596409.953093\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.171 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=6231 PROTO=TCP SPT=56863 DPT=3318 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  9 18:18:15 mc1 kernel: \[596467.170904\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.171 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=62760 PROTO=TCP SPT=56863 DPT=3311 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-10 09:01:12

Recently Reported IPs

104.22.70.111 104.22.70.118 104.22.70.121 104.22.70.122
104.22.70.114 104.22.70.128 104.22.70.138 104.22.70.137
104.22.70.135 104.22.70.144 104.22.70.145 104.22.70.148
104.22.70.154 104.22.70.139 104.22.70.160 104.22.70.166
104.22.70.159 104.22.70.176 104.22.70.180 104.22.70.192