Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.142.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8734
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.142.52.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021601 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 04:38:23 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 52.142.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.142.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.65 attack
Dec 25 11:05:11 pkdns2 sshd\[10881\]: Failed password for root from 49.88.112.65 port 43576 ssh2Dec 25 11:05:14 pkdns2 sshd\[10881\]: Failed password for root from 49.88.112.65 port 43576 ssh2Dec 25 11:05:17 pkdns2 sshd\[10881\]: Failed password for root from 49.88.112.65 port 43576 ssh2Dec 25 11:06:49 pkdns2 sshd\[10933\]: Failed password for root from 49.88.112.65 port 30205 ssh2Dec 25 11:07:38 pkdns2 sshd\[10964\]: Failed password for root from 49.88.112.65 port 54280 ssh2Dec 25 11:09:17 pkdns2 sshd\[11038\]: Failed password for root from 49.88.112.65 port 63819 ssh2
...
2019-12-25 17:17:57
49.229.179.147 attackspambots
1577255192 - 12/25/2019 07:26:32 Host: 49.229.179.147/49.229.179.147 Port: 445 TCP Blocked
2019-12-25 17:05:18
162.144.46.28 attack
162.144.46.28 - - [25/Dec/2019:06:49:34 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.144.46.28 - - [25/Dec/2019:06:49:36 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-25 17:14:16
190.246.205.208 attackspam
Dec 25 04:08:53 srv1 sshd[11811]: Address 190.246.205.208 maps to 208-205-246-190.fibertel.com.ar, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 25 04:08:53 srv1 sshd[11811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.205.208  user=r.r
Dec 25 04:08:55 srv1 sshd[11811]: Failed password for r.r from 190.246.205.208 port 56270 ssh2
Dec 25 04:08:55 srv1 sshd[11812]: Received disconnect from 190.246.205.208: 11: Bye Bye
Dec 25 04:39:49 srv1 sshd[12137]: Address 190.246.205.208 maps to 208-205-246-190.fibertel.com.ar, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 25 04:39:49 srv1 sshd[12137]: Invalid user home from 190.246.205.208
Dec 25 04:39:49 srv1 sshd[12137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.205.208 
Dec 25 04:39:51 srv1 sshd[12137]: Failed password for invalid user home from 190.246.205.208 port 547........
-------------------------------
2019-12-25 16:44:38
64.50.186.5 attackbots
xmlrpc attack
2019-12-25 17:01:18
51.15.149.58 attackspambots
\[2019-12-25 03:41:40\] NOTICE\[2839\] chan_sip.c: Registration from '"328"\' failed for '51.15.149.58:8341' - Wrong password
\[2019-12-25 03:41:40\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-25T03:41:40.270-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="328",SessionID="0x7f0fb499d728",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.15.149.58/8341",Challenge="5682896a",ReceivedChallenge="5682896a",ReceivedHash="52fcee648fef1c78e6b2c46fe89ed945"
\[2019-12-25 03:42:38\] NOTICE\[2839\] chan_sip.c: Registration from '"328"\' failed for '51.15.149.58:8399' - Wrong password
\[2019-12-25 03:42:38\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-25T03:42:38.370-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="328",SessionID="0x7f0fb499d728",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.15.149
2019-12-25 17:12:59
204.93.193.178 attack
Dec 25 11:26:13 gw1 sshd[31033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.93.193.178
Dec 25 11:26:15 gw1 sshd[31033]: Failed password for invalid user wahbe from 204.93.193.178 port 55162 ssh2
...
2019-12-25 17:15:38
159.203.201.201 attackbots
port scan and connect, tcp 8081 (blackice-icecap)
2019-12-25 17:16:03
218.92.0.155 attack
Dec 25 14:17:03 areeb-Workstation sshd[10355]: Failed password for root from 218.92.0.155 port 30434 ssh2
Dec 25 14:17:08 areeb-Workstation sshd[10355]: Failed password for root from 218.92.0.155 port 30434 ssh2
...
2019-12-25 16:49:45
14.98.215.178 attackbotsspam
Dec 25 01:43:24 plusreed sshd[8621]: Invalid user idcsea from 14.98.215.178
...
2019-12-25 17:18:37
116.239.254.100 attackspambots
2019-12-25 00:26:08 H=(ylmf-pc) [116.239.254.100]:50653 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2019-12-25 00:26:14 H=(ylmf-pc) [116.239.254.100]:50186 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2019-12-25 00:26:20 H=(ylmf-pc) [116.239.254.100]:50703 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
...
2019-12-25 17:12:43
45.224.105.143 attackspam
[munged]::80 45.224.105.143 - - [25/Dec/2019:07:26:47 +0100] "POST /[munged]: HTTP/1.1" 200 7111 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 45.224.105.143 - - [25/Dec/2019:07:26:48 +0100] "POST /[munged]: HTTP/1.1" 200 7106 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 45.224.105.143 - - [25/Dec/2019:07:26:50 +0100] "POST /[munged]: HTTP/1.1" 200 7114 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 45.224.105.143 - - [25/Dec/2019:07:26:51 +0100] "POST /[munged]: HTTP/1.1" 200 7110 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 45.224.105.143 - - [25/Dec/2019:07:26:52 +0100] "POST /[munged]: HTTP/1.1" 200 7110 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 45.224.105.143 - - [25/Dec/2019:07:26:53
2019-12-25 16:47:41
187.237.134.210 attack
Unauthorised access (Dec 25) SRC=187.237.134.210 LEN=40 TTL=235 ID=6858 TCP DPT=1433 WINDOW=1024 SYN
2019-12-25 17:10:51
100.37.20.196 attackbots
Port Scan
2019-12-25 16:45:39
37.187.16.30 attack
Dec 25 06:49:55 XXXXXX sshd[47631]: Invalid user flonory from 37.187.16.30 port 38740
2019-12-25 16:48:20

Recently Reported IPs

104.16.14.243 104.16.143.212 104.16.143.86 104.16.144.212
104.16.144.86 104.16.145.212 104.16.146.212 230.226.27.129
104.16.147.13 104.16.147.212 104.16.148.13 104.16.149.244
104.16.149.89 104.16.15.101 104.16.15.221 104.16.15.243
104.16.15.99 104.16.151.166 104.16.151.36 104.16.152.166