Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.105.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.105.81.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 11:34:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 81.105.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.105.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
149.202.206.206 attackspambots
2020-08-11T01:09:39.823472mail.standpoint.com.ua sshd[9234]: Invalid user kaibo from 149.202.206.206 port 33795
2020-08-11T01:09:39.826112mail.standpoint.com.ua sshd[9234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3034894.ip-149-202-206.eu
2020-08-11T01:09:39.823472mail.standpoint.com.ua sshd[9234]: Invalid user kaibo from 149.202.206.206 port 33795
2020-08-11T01:09:41.872757mail.standpoint.com.ua sshd[9234]: Failed password for invalid user kaibo from 149.202.206.206 port 33795 ssh2
2020-08-11T01:12:42.126350mail.standpoint.com.ua sshd[9605]: Invalid user 666666!@#$%^ from 149.202.206.206 port 51329
...
2020-08-11 07:00:44
106.1.19.2 attackbots
Telnet Server BruteForce Attack
2020-08-11 07:03:55
189.128.75.76 attackspam
1597091380 - 08/10/2020 22:29:40 Host: 189.128.75.76/189.128.75.76 Port: 445 TCP Blocked
2020-08-11 06:53:39
188.80.255.137 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-11 06:43:12
49.51.33.14 attack
firewall-block, port(s): 518/udp
2020-08-11 06:42:40
85.209.0.100 attackspam
SSHD unauthorised connection attempt (b)
2020-08-11 06:53:54
163.172.161.31 attackbotsspam
Aug 10 06:01:36 finn sshd[6561]: Did not receive identification string from 163.172.161.31 port 43132
Aug 10 06:01:53 finn sshd[6575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.161.31  user=r.r
Aug 10 06:01:55 finn sshd[6575]: Failed password for r.r from 163.172.161.31 port 56586 ssh2
Aug 10 06:01:55 finn sshd[6575]: Received disconnect from 163.172.161.31 port 56586:11: Normal Shutdown, Thank you for playing [preauth]
Aug 10 06:01:55 finn sshd[6575]: Disconnected from 163.172.161.31 port 56586 [preauth]
Aug 10 06:02:10 finn sshd[6579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.161.31  user=r.r
Aug 10 06:02:12 finn sshd[6579]: Failed password for r.r from 163.172.161.31 port 33826 ssh2
Aug 10 06:02:12 finn sshd[6579]: Received disconnect from 163.172.161.31 port 33826:11: Normal Shutdown, Thank you for playing [preauth]
Aug 10 06:02:12 finn sshd[6579]: Disconnect........
-------------------------------
2020-08-11 06:43:38
222.186.30.57 attack
Aug 10 23:46:38 rocket sshd[14490]: Failed password for root from 222.186.30.57 port 42154 ssh2
Aug 10 23:46:41 rocket sshd[14490]: Failed password for root from 222.186.30.57 port 42154 ssh2
Aug 10 23:46:44 rocket sshd[14490]: Failed password for root from 222.186.30.57 port 42154 ssh2
...
2020-08-11 06:48:46
103.59.53.34 attackspam
Unauthorised access (Aug 10) SRC=103.59.53.34 LEN=40 TOS=0x08 TTL=52 ID=15162 TCP DPT=8080 WINDOW=14095 SYN 
Unauthorised access (Aug 10) SRC=103.59.53.34 LEN=40 TOS=0x08 TTL=49 ID=16493 TCP DPT=8080 WINDOW=24970 SYN
2020-08-11 06:49:29
81.133.142.45 attackspam
Unauthorized SSH login attempts
2020-08-11 06:42:00
107.185.173.243 attackspambots
SSH brute force
2020-08-11 06:51:09
165.22.61.15 attackbots
xmlrpc attack
2020-08-11 07:01:07
184.97.227.90 attackbotsspam
Automatic report - Port Scan Attack
2020-08-11 06:58:10
84.38.187.134 attack
Unauthorized connection attempt detected from IP address 84.38.187.134 to port 3391 [T]
2020-08-11 07:15:02
191.54.133.187 attackbots
1597091395 - 08/10/2020 22:29:55 Host: 191.54.133.187/191.54.133.187 Port: 445 TCP Blocked
2020-08-11 06:46:51

Recently Reported IPs

104.16.105.39 104.16.10.89 104.16.106.39 104.16.103.81
104.16.104.81 104.16.106.44 104.16.108.76 104.16.109.133
104.16.11.2 104.16.110.133 104.16.106.53 104.16.105.53
104.16.109.76 104.16.196.83 104.16.198.40 104.16.195.83
104.16.197.236 104.16.195.153 104.16.198.153 104.16.196.236