Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.16.128.7 attackbots
[SYS1] Unsolicited Traffic - Port=ICMP (1x)
2020-10-14 06:25:42
104.16.181.15 attackbotsspam
spam host / http://firstmailer.info/firstmailer/link.php?M=
2020-08-18 00:51:56
104.16.120.50 attackspambots
SSH login attempts.
2020-06-19 19:02:30
104.16.119.50 attack
SSH login attempts.
2020-06-19 18:05:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.1.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48681
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.1.55.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040102 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 22:56:40 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 55.1.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.1.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.225.39.107 attack
DATE:2020-05-14 05:45:28, IP:121.225.39.107, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-05-14 20:16:13
14.241.248.57 attackbotsspam
May 14 17:24:37 pihole sshd[26034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.241.248.57 
...
2020-05-14 20:03:46
3.88.240.33 attackspambots
Attempted connection to port 26262.
2020-05-14 19:59:55
54.38.42.63 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-05-14 20:09:35
92.63.194.106 attack
May 14 11:00:04 ns3033917 sshd[27546]: Invalid user user from 92.63.194.106 port 42961
May 14 11:00:06 ns3033917 sshd[27546]: Failed password for invalid user user from 92.63.194.106 port 42961 ssh2
May 14 11:00:25 ns3033917 sshd[27569]: Invalid user guest from 92.63.194.106 port 37037
...
2020-05-14 20:06:58
51.83.216.198 attackspam
SSH Scan
2020-05-14 19:54:16
46.10.111.181 attack
Attempted connection to port 23.
2020-05-14 19:57:05
151.233.116.231 attack
Unauthorized connection attempt from IP address 151.233.116.231 on Port 445(SMB)
2020-05-14 19:50:51
194.12.110.3 attack
ET WEB_SERVER 401TRG Generic Webshell Request - POST with wget in body - port: 80 proto: TCP cat: Web Application Attack
2020-05-14 20:30:02
103.36.124.241 attackspam
scan z
2020-05-14 19:46:35
64.227.20.221 attack
64.227.20.221 - - [14/May/2020:13:35:30 +0200] "GET /wp-login.php HTTP/1.1" 200 6451 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.227.20.221 - - [14/May/2020:13:35:32 +0200] "POST /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.227.20.221 - - [14/May/2020:13:35:37 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-14 20:11:23
121.173.24.174 attackspambots
Unauthorized connection attempt detected from IP address 121.173.24.174 to port 23
2020-05-14 20:21:54
81.213.111.161 attack
Automatic report - Port Scan Attack
2020-05-14 20:30:22
114.39.2.108 attackspambots
Unauthorized connection attempt from IP address 114.39.2.108 on Port 445(SMB)
2020-05-14 19:52:33
79.106.137.71 attackbots
Attempted connection to port 23.
2020-05-14 19:52:04

Recently Reported IPs

104.16.1.54 104.16.1.56 104.16.1.57 104.16.1.59
104.16.1.6 104.16.1.60 104.16.1.63 104.16.1.65
104.16.1.66 104.16.1.67 104.16.1.68 157.139.205.94
104.16.1.69 104.16.1.7 104.16.1.70 104.16.1.71
104.16.1.72 172.156.100.174 104.16.1.74 104.16.1.75