Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.129.41.145 attackbots
(From eric@talkwithcustomer.com) Hey,

You have a website mikulachiropractic.net, right?

Of course you do. I am looking at your website now.

It gets traffic every day – that you’re probably spending $2 / $4 / $10 or more a click to get.  Not including all of the work you put into creating social media, videos, blog posts, emails, and so on.

So you’re investing seriously in getting people to that site.

But how’s it working?  Great? Okay?  Not so much?

If that answer could be better, then it’s likely you’re putting a lot of time, effort, and money into an approach that’s not paying off like it should.

Now… imagine doubling your lead conversion in just minutes… In fact, I’ll go even better.
 
You could actually get up to 100X more conversions!

I’m not making this up.  As Chris Smith, best-selling author of The Conversion Code says: Speed is essential - there is a 100x decrease in Leads when a Lead is contacted within 14 minutes vs being contacted within 5 minutes.

He’s backed up by a
2019-12-01 23:30:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.41.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7049
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.129.41.60.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 15:59:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
60.41.129.104.in-addr.arpa domain name pointer gens-inc.prizewest.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
60.41.129.104.in-addr.arpa	name = gens-inc.prizewest.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.249.145.208 attack
Failed password for invalid user nbkn from 5.249.145.208 port 47642 ssh2
2020-07-30 03:24:47
78.156.100.109 attackbots
2020-07-30T02:18:03.331400hostname sshd[113618]: Invalid user mazhuang from 78.156.100.109 port 53740
...
2020-07-30 03:42:44
73.247.159.79 attackbots
DATE:2020-07-29 14:06:25, IP:73.247.159.79, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-07-30 03:31:04
197.188.169.144 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-30 03:10:29
124.127.206.4 attack
Jul 29 21:03:49 prox sshd[5158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.206.4 
Jul 29 21:03:51 prox sshd[5158]: Failed password for invalid user serazetdinov from 124.127.206.4 port 30150 ssh2
2020-07-30 03:34:11
128.14.237.240 attackbots
SSH brute-force attempt
2020-07-30 03:33:31
5.196.158.24 attack
 TCP (SYN) 5.196.158.24:54506 -> port 1433, len 44
2020-07-30 03:25:31
118.25.144.133 attack
Brute-force attempt banned
2020-07-30 03:19:13
106.52.20.112 attackbotsspam
Repeated brute force against a port
2020-07-30 03:09:38
119.96.176.79 attackbotsspam
Jul 29 14:06:56 debian-2gb-nbg1-2 kernel: \[18282911.912646\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=119.96.176.79 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=231 ID=13210 PROTO=TCP SPT=51786 DPT=9520 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-30 03:15:05
51.255.35.41 attack
2020-07-29T19:18:44.086961abusebot-4.cloudsearch.cf sshd[8066]: Invalid user data01 from 51.255.35.41 port 52124
2020-07-29T19:18:44.092767abusebot-4.cloudsearch.cf sshd[8066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.ip-51-255-35.eu
2020-07-29T19:18:44.086961abusebot-4.cloudsearch.cf sshd[8066]: Invalid user data01 from 51.255.35.41 port 52124
2020-07-29T19:18:46.366005abusebot-4.cloudsearch.cf sshd[8066]: Failed password for invalid user data01 from 51.255.35.41 port 52124 ssh2
2020-07-29T19:23:20.747451abusebot-4.cloudsearch.cf sshd[8075]: Invalid user mao from 51.255.35.41 port 57359
2020-07-29T19:23:20.755645abusebot-4.cloudsearch.cf sshd[8075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.ip-51-255-35.eu
2020-07-29T19:23:20.747451abusebot-4.cloudsearch.cf sshd[8075]: Invalid user mao from 51.255.35.41 port 57359
2020-07-29T19:23:22.918088abusebot-4.cloudsearch.cf sshd[8075]: Failed pas
...
2020-07-30 03:37:20
181.58.120.115 attack
$f2bV_matches
2020-07-30 03:46:07
180.76.57.58 attackspambots
Jul 29 14:06:26 [host] sshd[3686]: Invalid user ho
Jul 29 14:06:26 [host] sshd[3686]: pam_unix(sshd:a
Jul 29 14:06:28 [host] sshd[3686]: Failed password
2020-07-30 03:36:03
182.61.39.254 attack
Jul 29 15:51:32 meumeu sshd[418967]: Invalid user linbl from 182.61.39.254 port 45270
Jul 29 15:51:32 meumeu sshd[418967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.39.254 
Jul 29 15:51:32 meumeu sshd[418967]: Invalid user linbl from 182.61.39.254 port 45270
Jul 29 15:51:34 meumeu sshd[418967]: Failed password for invalid user linbl from 182.61.39.254 port 45270 ssh2
Jul 29 15:55:22 meumeu sshd[419165]: Invalid user wangsj from 182.61.39.254 port 60388
Jul 29 15:55:22 meumeu sshd[419165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.39.254 
Jul 29 15:55:22 meumeu sshd[419165]: Invalid user wangsj from 182.61.39.254 port 60388
Jul 29 15:55:25 meumeu sshd[419165]: Failed password for invalid user wangsj from 182.61.39.254 port 60388 ssh2
Jul 29 15:59:21 meumeu sshd[419543]: Invalid user postgre from 182.61.39.254 port 47276
...
2020-07-30 03:25:54
47.94.206.50 attackspambots
Jul 29 21:13:50 ovpn sshd\[4877\]: Invalid user ftpuser from 47.94.206.50
Jul 29 21:13:50 ovpn sshd\[4877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.94.206.50
Jul 29 21:13:52 ovpn sshd\[4877\]: Failed password for invalid user ftpuser from 47.94.206.50 port 16052 ssh2
Jul 29 21:28:01 ovpn sshd\[8582\]: Invalid user zhaoyi from 47.94.206.50
Jul 29 21:28:01 ovpn sshd\[8582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.94.206.50
2020-07-30 03:45:49

Recently Reported IPs

104.129.41.81 104.129.41.6 104.129.42.234 104.129.41.96
104.131.52.129 104.131.54.209 104.131.6.78 104.131.58.165
104.131.56.33 104.131.52.148 104.131.57.24 104.131.53.186
104.131.6.251 104.131.6.194 104.131.60.199 104.131.62.118
104.131.64.88 104.131.63.70 104.131.65.92 104.131.62.70