Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Montreal

Region: Quebec

Country: Canada

Internet Service Provider: Videotron

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.221.70.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.221.70.215.			IN	A

;; AUTHORITY SECTION:
.			265	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051400 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 14 19:00:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
215.70.221.104.in-addr.arpa domain name pointer modemcable215.70-221-104.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.70.221.104.in-addr.arpa	name = modemcable215.70-221-104.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.212 attack
06/25/2020-02:11:47.674630 80.82.77.212 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-06-25 14:32:27
185.63.253.157 attackbots
Jun 25 08:16:25 ncomp sshd[28187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.63.253.157  user=root
Jun 25 08:16:27 ncomp sshd[28187]: Failed password for root from 185.63.253.157 port 34802 ssh2
Jun 25 08:16:35 ncomp sshd[28190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.63.253.157  user=root
Jun 25 08:16:37 ncomp sshd[28190]: Failed password for root from 185.63.253.157 port 50956 ssh2
2020-06-25 14:33:59
218.92.0.199 attack
Jun 25 07:50:13 dcd-gentoo sshd[27194]: User root from 218.92.0.199 not allowed because none of user's groups are listed in AllowGroups
Jun 25 07:50:19 dcd-gentoo sshd[27194]: error: PAM: Authentication failure for illegal user root from 218.92.0.199
Jun 25 07:50:19 dcd-gentoo sshd[27194]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.199 port 48444 ssh2
...
2020-06-25 14:29:18
185.176.27.102 attack
 TCP (SYN) 185.176.27.102:58562 -> port 28886, len 44
2020-06-25 14:54:06
141.98.9.156 attackspambots
Bruteforce, DDOS, Scanning Port, SSH Bruteforce every second using random IP.
2020-06-25 14:18:59
144.139.130.6 attackspam
Automatic report - Port Scan Attack
2020-06-25 14:37:42
45.172.108.72 attackspambots
Jun 25 06:41:04 h2779839 sshd[10749]: Invalid user admin from 45.172.108.72 port 57900
Jun 25 06:41:04 h2779839 sshd[10749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.108.72
Jun 25 06:41:04 h2779839 sshd[10749]: Invalid user admin from 45.172.108.72 port 57900
Jun 25 06:41:06 h2779839 sshd[10749]: Failed password for invalid user admin from 45.172.108.72 port 57900 ssh2
Jun 25 06:44:31 h2779839 sshd[10815]: Invalid user administrator from 45.172.108.72 port 48730
Jun 25 06:44:31 h2779839 sshd[10815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.108.72
Jun 25 06:44:31 h2779839 sshd[10815]: Invalid user administrator from 45.172.108.72 port 48730
Jun 25 06:44:33 h2779839 sshd[10815]: Failed password for invalid user administrator from 45.172.108.72 port 48730 ssh2
Jun 25 06:48:02 h2779839 sshd[10846]: Invalid user deploy from 45.172.108.72 port 39560
...
2020-06-25 14:47:55
120.92.94.94 attack
Jun 25 06:45:25 localhost sshd\[6295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.94.94  user=root
Jun 25 06:45:27 localhost sshd\[6295\]: Failed password for root from 120.92.94.94 port 20156 ssh2
Jun 25 06:47:08 localhost sshd\[6343\]: Invalid user wmf from 120.92.94.94
Jun 25 06:47:08 localhost sshd\[6343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.94.94
Jun 25 06:47:09 localhost sshd\[6343\]: Failed password for invalid user wmf from 120.92.94.94 port 34780 ssh2
...
2020-06-25 14:20:04
222.186.180.41 attackspambots
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-25 14:38:43
49.233.183.15 attack
Jun 25 05:54:14 santamaria sshd\[7364\]: Invalid user csc from 49.233.183.15
Jun 25 05:54:14 santamaria sshd\[7364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.183.15
Jun 25 05:54:16 santamaria sshd\[7364\]: Failed password for invalid user csc from 49.233.183.15 port 58058 ssh2
...
2020-06-25 14:40:52
52.251.59.211 attackspam
SSH_attack
2020-06-25 14:21:27
60.16.16.11 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-06-25 14:25:13
45.55.219.114 attackspambots
$f2bV_matches
2020-06-25 14:52:07
54.39.196.151 attack
(smtpauth) Failed SMTP AUTH login from 54.39.196.151 (CA/Canada/ip151.ip-54-39-196.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-25 08:23:50 login authenticator failed for ip151.ip-54-39-196.net (ADMIN) [54.39.196.151]: 535 Incorrect authentication data (set_id=a.m.bekhradi@srooyesh.com)
2020-06-25 14:54:46
117.6.97.138 attack
Invalid user dev from 117.6.97.138 port 8290
2020-06-25 14:31:31

Recently Reported IPs

31.46.13.138 204.68.244.237 165.110.87.15 148.227.152.43
66.139.61.157 230.77.140.144 111.24.2.9 139.224.22.98
175.49.17.97 146.235.227.174 140.235.35.193 213.148.37.18
114.239.213.102 81.137.110.191 42.218.211.197 157.65.64.128
186.75.239.141 129.75.180.194 237.160.87.183 37.229.113.170