Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hannover

Region: Niedersachsen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.70.41.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.70.41.104.			IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110400 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 04 15:38:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 104.41.70.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.41.70.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.116.226.180 attackbotsspam
20/2/13@14:11:27: FAIL: Alarm-Network address from=200.116.226.180
...
2020-02-14 06:38:59
185.166.131.146 attackspam
Automatically reported by fail2ban report script (mx1)
2020-02-14 06:53:15
200.56.88.143 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 06:19:25
123.207.142.208 attack
$f2bV_matches
2020-02-14 06:51:23
202.125.153.86 attack
Unauthorized connection attempt detected from IP address 202.125.153.86 to port 445
2020-02-14 06:44:22
171.232.159.232 attackbots
Automatic report - Port Scan Attack
2020-02-14 06:12:50
167.71.255.56 attackbots
Feb 13 12:14:13 web9 sshd\[20617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.255.56  user=root
Feb 13 12:14:15 web9 sshd\[20617\]: Failed password for root from 167.71.255.56 port 57140 ssh2
Feb 13 12:16:54 web9 sshd\[21001\]: Invalid user sysadmin from 167.71.255.56
Feb 13 12:16:54 web9 sshd\[21001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.255.56
Feb 13 12:16:56 web9 sshd\[21001\]: Failed password for invalid user sysadmin from 167.71.255.56 port 54402 ssh2
2020-02-14 06:22:53
200.236.124.71 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 06:36:52
51.105.249.223 attackspam
firewall-block, port(s): 58207/tcp
2020-02-14 06:13:55
68.183.102.130 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-02-14 06:18:30
218.92.0.168 attack
Feb 13 23:24:43 MK-Soft-Root2 sshd[27064]: Failed password for root from 218.92.0.168 port 42703 ssh2
Feb 13 23:24:46 MK-Soft-Root2 sshd[27064]: Failed password for root from 218.92.0.168 port 42703 ssh2
...
2020-02-14 06:34:51
185.232.65.50 attack
1581622208 - 02/14/2020 02:30:08 Host: 185.232.65.50/185.232.65.50 Port: 19 UDP Blocked
...
2020-02-14 06:11:53
104.245.144.43 attackspambots
(From braman.romaine53@gmail.com) UNLIMITED fresh and high ranking .EDU, Dofollow
and other links ready to backlink to your site
and rank your website for any niche out there! Completely exclusive links and never spammed to death http://www.backlinkmagic.xyz
2020-02-14 06:52:19
92.63.194.75 attackspam
RDP Bruteforce
2020-02-14 06:53:58
51.77.162.178 attack
Feb 13 20:11:23 karger wordpress(www.b)[16478]: Authentication attempt for unknown user domi from 51.77.162.178
Feb 13 20:11:23 karger wordpress(www.b)[16478]: XML-RPC authentication attempt for unknown user [login] from 51.77.162.178
...
2020-02-14 06:40:46

Recently Reported IPs

254.40.226.47 7.246.54.190 185.23.253.220 88.155.159.108
134.98.19.44 123.85.172.154 82.75.30.146 212.102.217.233
49.12.119.236 253.10.102.27 209.237.196.113 101.93.224.29
244.11.171.42 73.113.235.126 51.199.30.48 165.68.127.81
236.149.131.59 153.63.253.186 188.162.195.14 82.60.43.123