Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Buyproxies.org

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.140.80.113 spamattack
PHISHING AND SPAM ATTACK
FROM "Project Build Itself - MasterWoodworker@livemdpro.us> -" : 
SUBJECT "Make 16,000 Projects With Step By Step Plans" :
RECEIVED "from [104.140.80.113] (port=49900 helo=tommy.livemdpro.us)" :
DATE/TIMESENT "Tue, 30 Mar 2021 00:09:31"
IP ADDRESS "inetnum: 104.140.0.0 - 104.140.255.255 Organization: Eonix Corporation (EONIX)"
2021-03-30 04:18:40
104.140.80.4 attackbotsspam
Email rejected due to spam filtering
2020-10-07 07:13:31
104.140.80.4 attackspambots
Email rejected due to spam filtering
2020-10-06 23:35:05
104.140.80.4 attack
Email rejected due to spam filtering
2020-10-06 15:24:05
104.140.80.221 attackspambots
(From eric@talkwithwebvisitor.com) Hey, this is Eric and I ran across guarinochiropractic.com a few minutes ago.

Looks great… but now what?

By that I mean, when someone like me finds your website – either through Search or just bouncing around – what happens next?  Do you get a lot of leads from your site, or at least enough to make you happy?

Honestly, most business websites fall a bit short when it comes to generating paying customers. Studies show that 70% of a site’s visitors disappear and are gone forever after just a moment.

Here’s an idea…
 
How about making it really EASY for every visitor who shows up to get a personal phone call you as soon as they hit your site…
 
You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It signals you the moment they let you know they’re interested – so that you can talk to that lead while they’re literally looking over your site.

CLICK HERE http://w
2020-08-30 06:54:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.140.80.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.140.80.76.			IN	A

;; AUTHORITY SECTION:
.			191	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020033101 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 04:28:02 CST 2020
;; MSG SIZE  rcvd: 117
Host info
76.80.140.104.in-addr.arpa domain name pointer hyperdesking.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
76.80.140.104.in-addr.arpa	name = hyperdesking.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.55.73.205 attack
unauthorized connection attempt
2020-01-09 16:06:27
52.178.192.68 attack
unauthorized connection attempt
2020-01-09 16:29:46
1.173.170.192 attack
unauthorized connection attempt
2020-01-09 16:34:45
92.38.23.68 attack
unauthorized connection attempt
2020-01-09 16:24:46
37.164.65.98 attackbots
unauthorized connection attempt
2020-01-09 16:32:08
222.79.8.25 attackspam
unauthorized connection attempt
2020-01-09 16:05:49
123.9.235.250 attackspam
unauthorized connection attempt
2020-01-09 16:18:21
197.59.135.224 attackspambots
unauthorized connection attempt
2020-01-09 16:10:17
125.69.67.86 attackspam
unauthorized connection attempt
2020-01-09 16:17:23
45.221.78.38 attack
unauthorized connection attempt
2020-01-09 16:30:38
83.191.160.222 attackspambots
unauthorized connection attempt
2020-01-09 16:25:42
168.232.14.158 attackspambots
unauthorized connection attempt
2020-01-09 16:16:11
121.121.92.237 attackbots
unauthorized connection attempt
2020-01-09 15:59:18
60.54.84.232 attack
unauthorized connection attempt
2020-01-09 16:28:36
36.66.170.47 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-09 16:32:53

Recently Reported IPs

175.168.16.15 123.134.174.221 185.220.103.7 157.230.230.152
79.44.198.217 13.95.136.125 148.70.229.122 49.254.130.41
36.82.103.179 79.167.127.171 92.124.148.171 134.209.105.86
167.172.139.70 5.234.245.81 27.109.246.170 33.102.169.212
113.127.182.3 172.104.63.83 95.95.120.232 17.56.155.184