Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clayton

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.11.212.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48458
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.11.212.57.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 17 02:15:26 CST 2019
;; MSG SIZE  rcvd: 117
Host info
57.212.11.104.in-addr.arpa domain name pointer 104-11-212-57.lightspeed.sntcca.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
57.212.11.104.in-addr.arpa	name = 104-11-212-57.lightspeed.sntcca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.94.136.90 attack
$f2bV_matches
2019-06-24 05:47:44
182.61.185.113 attackbotsspam
Jun 23 05:46:29 mxgate1 postfix/postscreen[3456]: CONNECT from [182.61.185.113]:40556 to [176.31.12.44]:25
Jun 23 05:46:29 mxgate1 postfix/dnsblog[3459]: addr 182.61.185.113 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 23 05:46:29 mxgate1 postfix/dnsblog[3457]: addr 182.61.185.113 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 23 05:46:29 mxgate1 postfix/dnsblog[3457]: addr 182.61.185.113 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 23 05:46:29 mxgate1 postfix/dnsblog[3458]: addr 182.61.185.113 listed by domain bl.spamcop.net as 127.0.0.2
Jun 23 05:46:29 mxgate1 postfix/dnsblog[3460]: addr 182.61.185.113 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 23 05:46:29 mxgate1 postfix/dnsblog[3461]: addr 182.61.185.113 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 23 05:46:35 mxgate1 postfix/postscreen[3456]: DNSBL rank 6 for [182.61.185.113]:40556
Jun 23 05:46:36 mxgate1 postfix/postscreen[3456]: NOQUEUE: reject: RCPT from [182.61.185.113]:405........
-------------------------------
2019-06-24 05:48:59
103.89.91.156 attack
RDP brute force attack detected by fail2ban
2019-06-24 06:15:54
187.181.239.83 attackspam
Jun 22 22:40:34 xxxxxxx0 sshd[18874]: Invalid user cooper from 187.181.239.83 port 48696
Jun 22 22:40:34 xxxxxxx0 sshd[18874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.181.239.83
Jun 22 22:40:36 xxxxxxx0 sshd[18874]: Failed password for invalid user cooper from 187.181.239.83 port 48696 ssh2
Jun 22 22:45:13 xxxxxxx0 sshd[19444]: Invalid user test2 from 187.181.239.83 port 46582
Jun 22 22:45:13 xxxxxxx0 sshd[19444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.181.239.83

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.181.239.83
2019-06-24 06:24:28
206.197.31.243 attack
Unauthorized connection attempt from IP address 206.197.31.243 on Port 445(SMB)
2019-06-24 05:56:22
136.56.83.96 attackspambots
20 attempts against mh-ssh on ice.magehost.pro
2019-06-24 05:48:07
129.204.194.119 attack
2019-06-23T20:05:35.972487Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 129.204.194.119:60282 \(107.175.91.48:22\) \[session: 20410d903dc6\]
2019-06-23T20:07:46.531973Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 129.204.194.119:38926 \(107.175.91.48:22\) \[session: 87dcf45630ad\]
...
2019-06-24 06:05:38
37.144.109.215 attackbotsspam
Unauthorized connection attempt from IP address 37.144.109.215 on Port 445(SMB)
2019-06-24 05:50:31
27.34.74.37 attackbotsspam
Lines containing failures of 27.34.74.37
Jun 23 12:44:17 server-name sshd[8405]: Invalid user admin from 27.34.74.37 port 59006
Jun 23 12:44:17 server-name sshd[8405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.34.74.37 
Jun 23 12:44:19 server-name sshd[8405]: Failed password for invalid user admin from 27.34.74.37 port 59006 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.34.74.37
2019-06-24 06:22:38
186.94.197.179 attackbots
Unauthorized connection attempt from IP address 186.94.197.179 on Port 445(SMB)
2019-06-24 05:54:37
159.65.81.187 attack
Jun 23 22:09:16 tuxlinux sshd[47249]: Invalid user admin from 159.65.81.187 port 44078
Jun 23 22:09:16 tuxlinux sshd[47249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.81.187 
Jun 23 22:09:16 tuxlinux sshd[47249]: Invalid user admin from 159.65.81.187 port 44078
Jun 23 22:09:16 tuxlinux sshd[47249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.81.187 
...
2019-06-24 05:42:06
103.15.254.59 attackspam
Unauthorized connection attempt from IP address 103.15.254.59 on Port 445(SMB)
2019-06-24 06:06:12
122.168.197.36 attackspam
Unauthorized connection attempt from IP address 122.168.197.36 on Port 445(SMB)
2019-06-24 06:19:01
35.187.224.76 attackspam
Automatic report generated by Wazuh
2019-06-24 06:07:43
31.220.13.3 attack
Jun 23 20:13:36   TCP Attack: SRC=31.220.13.3 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=70  DF PROTO=TCP SPT=58232 DPT=993 WINDOW=29200 RES=0x00 SYN URGP=0
2019-06-24 06:01:04

Recently Reported IPs

180.209.44.237 72.221.118.223 100.50.243.27 24.158.23.113
93.180.53.240 3.3.21.185 91.163.86.187 91.222.2.226
32.221.146.134 130.41.90.239 60.20.224.208 53.135.211.208
14.204.206.141 129.25.105.186 134.73.129.57 177.21.129.19
89.237.108.44 121.160.198.194 200.189.238.31 135.66.19.43