Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.159.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.159.39.			IN	A

;; AUTHORITY SECTION:
.			499	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:34:57 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 39.159.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.159.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.49.118 attackbots
Nov 21 00:37:47 MK-Soft-VM7 sshd[27566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.118 
Nov 21 00:37:49 MK-Soft-VM7 sshd[27566]: Failed password for invalid user caria from 106.12.49.118 port 32964 ssh2
...
2019-11-21 07:39:59
198.108.67.82 attack
198.108.67.82 was recorded 5 times by 4 hosts attempting to connect to the following ports: 5909,5201,2320,2121,1029. Incident counter (4h, 24h, all-time): 5, 15, 207
2019-11-21 07:41:46
51.68.115.235 attackbots
2019-11-20T23:38:03.068719abusebot-2.cloudsearch.cf sshd\[32108\]: Invalid user backup from 51.68.115.235 port 52671
2019-11-21 07:49:23
1.1.244.229 attack
Fail2Ban Ban Triggered
2019-11-21 07:38:51
144.91.88.63 attack
CloudCIX Reconnaissance Scan Detected, PTR: vmi309745.contaboserver.net.
2019-11-21 08:03:27
189.126.199.194 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: mail.acsc.org.br.
2019-11-21 07:48:16
94.191.62.170 attack
Nov 21 00:40:36 h2177944 sshd\[21233\]: Invalid user ki@123 from 94.191.62.170 port 41824
Nov 21 00:40:36 h2177944 sshd\[21233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.62.170
Nov 21 00:40:38 h2177944 sshd\[21233\]: Failed password for invalid user ki@123 from 94.191.62.170 port 41824 ssh2
Nov 21 00:44:49 h2177944 sshd\[21289\]: Invalid user rootadministrator from 94.191.62.170 port 51244
...
2019-11-21 07:59:04
106.13.4.117 attackspam
2019-11-21T00:31:04.6659681240 sshd\[26277\]: Invalid user othella from 106.13.4.117 port 42228
2019-11-21T00:31:04.6685931240 sshd\[26277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.4.117
2019-11-21T00:31:07.1662511240 sshd\[26277\]: Failed password for invalid user othella from 106.13.4.117 port 42228 ssh2
...
2019-11-21 07:58:31
213.171.226.183 attackbotsspam
Automatic report - Port Scan Attack
2019-11-21 07:25:49
45.136.111.21 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-21 07:52:41
119.1.238.156 attackbotsspam
Nov 21 01:20:44 pkdns2 sshd\[46971\]: Invalid user asterisk from 119.1.238.156Nov 21 01:20:45 pkdns2 sshd\[46971\]: Failed password for invalid user asterisk from 119.1.238.156 port 51995 ssh2Nov 21 01:25:07 pkdns2 sshd\[47163\]: Invalid user sales from 119.1.238.156Nov 21 01:25:08 pkdns2 sshd\[47163\]: Failed password for invalid user sales from 119.1.238.156 port 41375 ssh2Nov 21 01:29:36 pkdns2 sshd\[47327\]: Invalid user max from 119.1.238.156Nov 21 01:29:37 pkdns2 sshd\[47327\]: Failed password for invalid user max from 119.1.238.156 port 58988 ssh2
...
2019-11-21 07:30:52
74.208.155.65 attackbots
fail2ban honeypot
2019-11-21 07:59:21
221.132.17.81 attack
Nov 20 23:36:39  sshd[19696]: Failed password for invalid user asterisk from 221.132.17.81 port 35800 ssh2
2019-11-21 07:55:59
185.216.140.52 attackspam
[Thu Nov 21 05:37:42.245461 2019] [:error] [pid 19368:tid 140678164018944] [client 185.216.140.52:55027] [client 185.216.140.52] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "972"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/POLICY/PROTOCOL_NOT_ALLOWED"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "XdXANj2XASevjD4sCTH2pgAAABg"]
...
2019-11-21 07:29:54
52.187.17.107 attackbots
2019-11-20T22:37:31.771146abusebot-4.cloudsearch.cf sshd\[29787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.17.107  user=root
2019-11-21 07:37:43

Recently Reported IPs

104.16.159.101 104.16.158.38 104.16.159.74 104.16.16.209
104.16.16.87 104.16.160.39 104.16.160.101 104.21.63.211
104.16.160.74 104.16.160.215 104.16.160.83 104.16.163.215
104.16.161.39 104.16.163.5 104.16.164.101 104.16.165.32
104.16.161.83 104.16.161.66 104.16.162.215 104.16.164.32