Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.70.157.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13868
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.70.157.0.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 25 08:38:28 CST 2019
;; MSG SIZE  rcvd: 116
Host info
0.157.70.104.in-addr.arpa domain name pointer a104-70-157-0.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
0.157.70.104.in-addr.arpa	name = a104-70-157-0.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
69.162.68.54 attack
$f2bV_matches_ltvn
2019-08-01 14:37:42
49.81.38.45 attackspam
SpamReport
2019-08-01 14:39:37
222.186.52.120 attack
2019-08-01T03:48:14.681143abusebot-2.cloudsearch.cf sshd\[15639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.120  user=root
2019-08-01 14:07:09
121.201.43.233 attackbots
Aug  1 07:48:59 root sshd[27013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.201.43.233 
Aug  1 07:49:00 root sshd[27013]: Failed password for invalid user station from 121.201.43.233 port 51780 ssh2
Aug  1 07:56:23 root sshd[27064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.201.43.233 
...
2019-08-01 14:10:18
115.75.152.202 attackspambots
Unauthorized connection attempt from IP address 115.75.152.202 on Port 445(SMB)
2019-08-01 14:20:24
138.97.226.132 attackspam
failed_logins
2019-08-01 14:33:38
193.105.155.168 attackbotsspam
Aug  1 05:31:35 [munged] sshd[7288]: Invalid user elly from 193.105.155.168 port 55554
Aug  1 05:31:35 [munged] sshd[7288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.105.155.168
2019-08-01 14:07:55
180.243.108.209 attack
Automatic report - Port Scan Attack
2019-08-01 14:26:22
84.121.98.249 attack
Aug  1 05:31:20 tuxlinux sshd[54834]: Invalid user zimbra from 84.121.98.249 port 42231
Aug  1 05:31:20 tuxlinux sshd[54834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.98.249 
Aug  1 05:31:20 tuxlinux sshd[54834]: Invalid user zimbra from 84.121.98.249 port 42231
Aug  1 05:31:20 tuxlinux sshd[54834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.98.249 
Aug  1 05:31:20 tuxlinux sshd[54834]: Invalid user zimbra from 84.121.98.249 port 42231
Aug  1 05:31:20 tuxlinux sshd[54834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.98.249 
Aug  1 05:31:22 tuxlinux sshd[54834]: Failed password for invalid user zimbra from 84.121.98.249 port 42231 ssh2
...
2019-08-01 14:36:33
54.180.92.66 attack
2019-08-01T05:31:30.111936stark.klein-stark.info sshd\[23861\]: Invalid user lamarche from 54.180.92.66 port 40469
2019-08-01T05:31:30.116775stark.klein-stark.info sshd\[23861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-54-180-92-66.ap-northeast-2.compute.amazonaws.com
2019-08-01T05:31:32.320586stark.klein-stark.info sshd\[23861\]: Failed password for invalid user lamarche from 54.180.92.66 port 40469 ssh2
...
2019-08-01 14:28:00
119.5.170.84 attackbots
" "
2019-08-01 14:20:07
159.203.115.76 attackspambots
Aug  1 08:25:33 vpn01 sshd\[12198\]: Invalid user tamara from 159.203.115.76
Aug  1 08:25:33 vpn01 sshd\[12198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.115.76
Aug  1 08:25:35 vpn01 sshd\[12198\]: Failed password for invalid user tamara from 159.203.115.76 port 56722 ssh2
2019-08-01 14:32:35
131.179.37.84 attack
SSH-bruteforce attempts
2019-08-01 14:19:04
199.249.230.108 attackbotsspam
Automatic report - Banned IP Access
2019-08-01 14:07:32
122.114.199.5 attackspam
$f2bV_matches
2019-08-01 14:45:00

Recently Reported IPs

179.191.118.206 123.27.3.25 179.33.189.150 115.75.177.169
58.186.100.77 202.163.107.253 31.58.200.124 176.204.54.3
248.87.255.12 210.99.198.13 79.101.199.182 229.189.91.125
189.84.194.94 125.160.113.172 206.132.109.91 166.153.73.27
79.142.115.198 37.133.220.87 42.242.208.204 186.61.195.95