Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.143.242.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.143.242.239.		IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041102 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 12 07:05:32 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 239.242.143.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.242.143.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.30.48.61 attackspambots
DATE:2020-05-29 11:46:11, IP:191.30.48.61, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-29 18:33:34
202.100.223.42 attackbots
Invalid user zlc from 202.100.223.42 port 40588
2020-05-29 18:29:25
202.77.105.110 attackspambots
$f2bV_matches
2020-05-29 18:15:50
114.43.63.7 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-29 18:23:58
46.101.57.196 attackbots
Automatic report - XMLRPC Attack
2020-05-29 18:47:19
159.203.17.176 attackspambots
Tried sshing with brute force.
2020-05-29 18:32:58
216.170.125.163 attackspam
k+ssh-bruteforce
2020-05-29 18:14:44
41.139.128.113 attack
Dovecot Invalid User Login Attempt.
2020-05-29 18:35:01
158.69.223.91 attackspambots
May 29 12:19:55 server sshd[6771]: Failed password for root from 158.69.223.91 port 59937 ssh2
May 29 12:22:48 server sshd[7039]: Failed password for root from 158.69.223.91 port 55850 ssh2
...
2020-05-29 18:43:50
113.161.81.116 attackbots
Dovecot Invalid User Login Attempt.
2020-05-29 18:21:42
106.52.115.36 attack
May 29 07:19:33 pkdns2 sshd\[35166\]: Failed password for root from 106.52.115.36 port 44192 ssh2May 29 07:22:23 pkdns2 sshd\[35312\]: Invalid user trading from 106.52.115.36May 29 07:22:26 pkdns2 sshd\[35312\]: Failed password for invalid user trading from 106.52.115.36 port 56700 ssh2May 29 07:25:20 pkdns2 sshd\[35486\]: Failed password for root from 106.52.115.36 port 40982 ssh2May 29 07:28:14 pkdns2 sshd\[35648\]: Invalid user apache from 106.52.115.36May 29 07:28:15 pkdns2 sshd\[35648\]: Failed password for invalid user apache from 106.52.115.36 port 53488 ssh2
...
2020-05-29 18:12:28
211.107.12.63 attackspambots
(sshd) Failed SSH login from 211.107.12.63 (KR/South Korea/-): 5 in the last 3600 secs
2020-05-29 18:17:30
60.170.180.96 attackspam
Unauthorized connection attempt detected from IP address 60.170.180.96 to port 23
2020-05-29 18:36:18
118.25.195.244 attackbotsspam
Invalid user student from 118.25.195.244 port 46762
2020-05-29 18:40:34
14.142.143.138 attack
May 29 10:53:49 ajax sshd[16709]: Failed password for root from 14.142.143.138 port 44704 ssh2
2020-05-29 18:36:01

Recently Reported IPs

240.5.126.186 92.171.91.185 255.131.179.79 95.110.59.155
102.34.22.249 177.215.123.28 239.124.135.245 65.70.162.198
210.57.235.112 23.225.121.23 37.167.81.82 178.139.152.203
208.82.205.190 54.15.3.33 159.203.177.105 103.105.31.75
194.226.78.243 117.189.51.13 220.145.83.6 79.89.111.255