Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.154.70.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;21.154.70.34.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070301 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 04 11:26:28 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 34.70.154.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.70.154.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.148 attackbots
$f2bV_matches
2020-05-22 12:30:19
222.186.15.10 attack
May 22 01:03:32 plusreed sshd[31517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
May 22 01:03:34 plusreed sshd[31517]: Failed password for root from 222.186.15.10 port 25239 ssh2
...
2020-05-22 13:05:20
185.173.106.206 attack
Invalid user ambari from 185.173.106.206 port 52618
2020-05-22 13:06:30
222.186.42.155 attackbotsspam
(sshd) Failed SSH login from 222.186.42.155 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 22 07:00:45 amsweb01 sshd[8123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
May 22 07:00:47 amsweb01 sshd[8123]: Failed password for root from 222.186.42.155 port 47390 ssh2
May 22 07:00:49 amsweb01 sshd[8123]: Failed password for root from 222.186.42.155 port 47390 ssh2
May 22 07:00:52 amsweb01 sshd[8123]: Failed password for root from 222.186.42.155 port 47390 ssh2
May 22 07:00:54 amsweb01 sshd[8138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
2020-05-22 13:02:02
185.193.177.181 attackbotsspam
May 22 06:32:46 vps647732 sshd[27985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.193.177.181
May 22 06:32:48 vps647732 sshd[27985]: Failed password for invalid user hqn from 185.193.177.181 port 47362 ssh2
...
2020-05-22 12:39:08
124.30.44.214 attackbots
(sshd) Failed SSH login from 124.30.44.214 (IN/India/firewallgoa.unichemlabs.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 22 06:54:08 srv sshd[19572]: Invalid user teamspeak from 124.30.44.214 port 61195
May 22 06:54:10 srv sshd[19572]: Failed password for invalid user teamspeak from 124.30.44.214 port 61195 ssh2
May 22 07:00:22 srv sshd[19697]: Invalid user eir from 124.30.44.214 port 50184
May 22 07:00:24 srv sshd[19697]: Failed password for invalid user eir from 124.30.44.214 port 50184 ssh2
May 22 07:04:03 srv sshd[19759]: Invalid user lmk from 124.30.44.214 port 39874
2020-05-22 12:26:36
192.126.164.41 attackspam
(From bullard.angelita75@hotmail.com) Hello

We provide great lists of free public proxy servers with different protocols to unblock contents, 
bypass restrictions or surf anonymously.
Enjoy the unique features that only our page have on all the internet.
All proxies work at the moment the list is updated.

MORE INFO HERE=>  https://bit.ly/2WcNAcu
2020-05-22 12:52:32
86.248.56.103 attack
May 22 06:22:25 h2779839 sshd[26479]: Invalid user j from 86.248.56.103 port 55422
May 22 06:22:25 h2779839 sshd[26479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.248.56.103
May 22 06:22:25 h2779839 sshd[26479]: Invalid user j from 86.248.56.103 port 55422
May 22 06:22:27 h2779839 sshd[26479]: Failed password for invalid user j from 86.248.56.103 port 55422 ssh2
May 22 06:28:20 h2779839 sshd[26577]: Invalid user hac from 86.248.56.103 port 59766
May 22 06:28:20 h2779839 sshd[26577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.248.56.103
May 22 06:28:20 h2779839 sshd[26577]: Invalid user hac from 86.248.56.103 port 59766
May 22 06:28:22 h2779839 sshd[26577]: Failed password for invalid user hac from 86.248.56.103 port 59766 ssh2
May 22 06:31:51 h2779839 sshd[26626]: Invalid user zxc from 86.248.56.103 port 38198
...
2020-05-22 12:43:20
125.124.117.226 attackspambots
May 22 09:22:02 gw1 sshd[19455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.117.226
May 22 09:22:04 gw1 sshd[19455]: Failed password for invalid user paj from 125.124.117.226 port 52366 ssh2
...
2020-05-22 12:35:13
218.92.0.158 attackbotsspam
May 22 06:19:43 * sshd[32661]: Failed password for root from 218.92.0.158 port 53299 ssh2
May 22 06:19:56 * sshd[32661]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 53299 ssh2 [preauth]
2020-05-22 12:23:53
49.233.81.191 attackbotsspam
2020-05-22T04:50:32.896332shield sshd\[14523\]: Invalid user jft from 49.233.81.191 port 36998
2020-05-22T04:50:32.900514shield sshd\[14523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.81.191
2020-05-22T04:50:35.545516shield sshd\[14523\]: Failed password for invalid user jft from 49.233.81.191 port 36998 ssh2
2020-05-22T04:55:19.987760shield sshd\[16114\]: Invalid user oin from 49.233.81.191 port 33925
2020-05-22T04:55:19.991967shield sshd\[16114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.81.191
2020-05-22 12:56:01
106.12.120.207 attackbotsspam
Invalid user vvx from 106.12.120.207 port 52623
2020-05-22 13:04:49
222.186.173.142 attack
$f2bV_matches
2020-05-22 12:55:18
145.239.72.63 attack
5x Failed Password
2020-05-22 13:02:32
80.82.65.74 attackbotsspam
May 22 06:17:32 debian-2gb-nbg1-2 kernel: \[12379870.795563\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.74 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=47107 PROTO=TCP SPT=49870 DPT=23450 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-22 12:31:29

Recently Reported IPs

159.65.5.106 186.216.67.67 237.83.62.187 181.101.168.138
107.37.110.24 247.131.107.84 180.223.18.75 127.118.8.82
89.126.10.49 167.71.171.32 224.126.131.29 111.234.208.248
217.53.85.116 184.177.55.70 94.45.213.67 86.184.214.190
157.47.154.134 109.153.100.118 185.153.199.223 77.68.16.253