Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 210.70.34.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16944
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;210.70.34.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 13:22:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 164.34.70.210.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 164.34.70.210.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.203.224.3 attack
Unauthorized connection attempt from IP address 190.203.224.3 on Port 445(SMB)
2019-09-24 03:57:25
41.39.47.173 attackbots
Unauthorized connection attempt from IP address 41.39.47.173 on Port 445(SMB)
2019-09-24 04:21:45
109.98.23.212 attack
Unauthorized connection attempt from IP address 109.98.23.212 on Port 445(SMB)
2019-09-24 04:10:52
202.28.64.1 attack
Automatic report - Banned IP Access
2019-09-24 04:35:24
206.189.72.217 attackbotsspam
Sep 23 21:34:34 MK-Soft-VM3 sshd[17535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.72.217 
Sep 23 21:34:36 MK-Soft-VM3 sshd[17535]: Failed password for invalid user scanuser from 206.189.72.217 port 52508 ssh2
...
2019-09-24 04:02:57
165.22.63.29 attack
Sep 23 08:54:17 sachi sshd\[6194\]: Invalid user 123456 from 165.22.63.29
Sep 23 08:54:17 sachi sshd\[6194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.29
Sep 23 08:54:20 sachi sshd\[6194\]: Failed password for invalid user 123456 from 165.22.63.29 port 37236 ssh2
Sep 23 08:59:14 sachi sshd\[6614\]: Invalid user ts3@123 from 165.22.63.29
Sep 23 08:59:14 sachi sshd\[6614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.29
2019-09-24 04:28:07
62.99.178.46 attackbots
proto=tcp  .  spt=35017  .  dpt=25  .     (listed on   dnsbl-sorbs plus abuseat-org and barracuda)     (543)
2019-09-24 04:06:58
195.57.73.197 attackspam
Unauthorized connection attempt from IP address 195.57.73.197 on Port 445(SMB)
2019-09-24 04:01:22
1.217.24.139 attackbotsspam
Sep 23 06:32:44 mail postfix/postscreen[1044]: PREGREET 19 after 1.1 from [1.217.24.139]:42003: EHLO litopress.it

...
2019-09-24 04:34:59
202.51.74.189 attackspam
SSH Brute-Force reported by Fail2Ban
2019-09-24 04:31:00
89.248.168.202 attack
09/23/2019-16:16:52.126959 89.248.168.202 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-24 04:23:31
180.24.87.233 attackspam
Unauthorised access (Sep 23) SRC=180.24.87.233 LEN=40 TOS=0x10 PREC=0x40 TTL=46 ID=53687 TCP DPT=8080 WINDOW=12550 SYN 
Unauthorised access (Sep 22) SRC=180.24.87.233 LEN=40 TOS=0x10 PREC=0x40 TTL=46 ID=43231 TCP DPT=8080 WINDOW=12550 SYN
2019-09-24 04:22:46
89.248.160.193 attack
09/23/2019-16:02:16.689099 89.248.160.193 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-24 04:04:00
103.45.99.214 attackspambots
Apr 12 19:03:27 vtv3 sshd\[3157\]: Invalid user chiosdental from 103.45.99.214 port 58392
Apr 12 19:03:28 vtv3 sshd\[3157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.99.214
Apr 12 19:03:29 vtv3 sshd\[3157\]: Failed password for invalid user chiosdental from 103.45.99.214 port 58392 ssh2
Apr 12 19:11:50 vtv3 sshd\[8009\]: Invalid user divya from 103.45.99.214 port 33818
Apr 12 19:11:50 vtv3 sshd\[8009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.99.214
Apr 12 19:28:29 vtv3 sshd\[17081\]: Invalid user Mauno from 103.45.99.214 port 41148
Apr 12 19:28:29 vtv3 sshd\[17081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.99.214
Apr 12 19:28:30 vtv3 sshd\[17081\]: Failed password for invalid user Mauno from 103.45.99.214 port 41148 ssh2
Apr 12 19:36:42 vtv3 sshd\[22119\]: Invalid user factorio from 103.45.99.214 port 44798
Apr 12 19:36:42 vtv3 sshd\[2211
2019-09-24 04:08:10
98.156.148.239 attackbotsspam
Sep 23 16:54:10 server sshd\[14405\]: Invalid user atul from 98.156.148.239 port 52156
Sep 23 16:54:10 server sshd\[14405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239
Sep 23 16:54:12 server sshd\[14405\]: Failed password for invalid user atul from 98.156.148.239 port 52156 ssh2
Sep 23 16:58:21 server sshd\[28782\]: Invalid user nagesh from 98.156.148.239 port 37534
Sep 23 16:58:21 server sshd\[28782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239
2019-09-24 04:38:06

Recently Reported IPs

103.86.48.1 34.173.246.104 96.12.187.38 235.200.160.134
164.110.241.205 129.44.149.186 6.163.228.192 217.118.252.38
21.159.147.106 253.122.249.211 185.63.145.247 72.68.191.253
198.163.240.127 117.197.173.150 214.2.182.162 96.27.68.30
191.222.127.91 74.214.40.135 254.169.81.90 116.80.185.93