Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.12.203.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.12.203.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 20:14:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
221.203.12.104.in-addr.arpa domain name pointer 104-12-203-221.lightspeed.austtx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.203.12.104.in-addr.arpa	name = 104-12-203-221.lightspeed.austtx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.68.226.234 attack
Port scan: Attack repeated for 24 hours
2020-07-21 19:36:37
35.226.76.161 attack
$f2bV_matches
2020-07-21 20:05:06
128.14.141.99 attackspambots
Unauthorized connection attempt detected from IP address 128.14.141.99 to port 8086
2020-07-21 19:44:58
210.1.19.131 attack
Invalid user agnes from 210.1.19.131 port 56267
2020-07-21 20:10:44
45.137.182.148 attackbotsspam
firewall-block, port(s): 1433/tcp
2020-07-21 20:00:58
157.230.132.100 attackbotsspam
Invalid user misha from 157.230.132.100 port 42690
2020-07-21 20:16:40
74.82.47.31 attackbotsspam
" "
2020-07-21 19:59:12
37.49.224.157 attack
Jul 21 05:49:10 karger postfix/smtpd[31521]: warning: unknown[37.49.224.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 21 05:49:34 karger postfix/smtpd[31793]: warning: unknown[37.49.224.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 21 05:49:53 karger postfix/smtpd[31809]: warning: unknown[37.49.224.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-21 20:12:12
66.228.60.120 attackbots
Port Scan detected!
...
2020-07-21 20:00:23
107.189.10.245 attackbots
PHP Injection Attack: Configuration Directive Found
PHP Injection Attack: I/O Stream Found
PHP Injection Attack: High-Risk PHP Function Name Found
2020-07-21 19:59:58
178.32.163.249 attackbotsspam
Invalid user bnk from 178.32.163.249 port 49392
2020-07-21 19:38:59
159.65.136.196 attackbots
firewall-block, port(s): 11723/tcp
2020-07-21 20:17:38
124.156.107.252 attackspambots
Invalid user boon from 124.156.107.252 port 37508
2020-07-21 20:12:34
95.110.129.91 attackbotsspam
Automatic report - XMLRPC Attack
2020-07-21 20:23:07
51.68.11.223 attack
Website hacking attempt: Improper php file access [php file]
2020-07-21 20:02:14

Recently Reported IPs

41.88.0.233 18.52.95.61 220.190.143.242 167.161.72.48
7.149.252.105 202.88.11.153 192.2.223.210 35.185.124.112
41.158.145.219 227.157.234.231 214.93.240.136 17.59.132.251
184.95.160.224 121.171.159.76 102.68.128.71 161.160.227.45
247.156.122.186 151.163.133.32 99.47.189.246 241.234.148.225