Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.189.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61876
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.189.38.			IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 11:06:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 38.189.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.189.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.24.103.242 attackbots
112.24.103.242 has been banned from MailServer for Abuse
...
2019-11-02 05:45:35
186.50.146.44 attackbotsspam
23/tcp
[2019-11-01]1pkt
2019-11-02 05:12:38
220.191.255.79 attack
Unauthorized connection attempt from IP address 220.191.255.79 on Port 445(SMB)
2019-11-02 05:12:07
91.195.46.39 attackbotsspam
3389BruteforceFW21
2019-11-02 05:46:03
177.125.109.99 attackspambots
Unauthorized connection attempt from IP address 177.125.109.99 on Port 445(SMB)
2019-11-02 05:18:31
178.128.215.16 attackspambots
Nov  1 21:15:16 vmanager6029 sshd\[27343\]: Invalid user target from 178.128.215.16 port 37952
Nov  1 21:15:16 vmanager6029 sshd\[27343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16
Nov  1 21:15:19 vmanager6029 sshd\[27343\]: Failed password for invalid user target from 178.128.215.16 port 37952 ssh2
2019-11-02 05:14:52
62.234.83.50 attackspam
Automatic report - Banned IP Access
2019-11-02 05:29:55
163.172.216.150 attackbotsspam
WordPress wp-login brute force :: 163.172.216.150 0.116 BYPASS [01/Nov/2019:21:25:19  0000] www.[censored_4] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-02 05:45:16
84.200.211.112 attackbotsspam
Brute force SMTP login attempted.
...
2019-11-02 05:27:31
118.170.37.2 attackbots
23/tcp
[2019-11-01]1pkt
2019-11-02 05:31:26
200.31.27.148 attack
Unauthorized connection attempt from IP address 200.31.27.148 on Port 445(SMB)
2019-11-02 05:24:29
106.124.137.103 attack
Nov  1 21:14:51 host sshd[49646]: Invalid user iz from 106.124.137.103 port 49906
...
2019-11-02 05:39:24
36.230.145.211 attackbotsspam
23/tcp
[2019-11-01]1pkt
2019-11-02 05:07:37
31.23.34.251 attackspam
445/tcp
[2019-11-01]1pkt
2019-11-02 05:44:53
103.126.100.179 attackbots
Nov  1 21:09:46 ovpn sshd\[11343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.179  user=root
Nov  1 21:09:49 ovpn sshd\[11343\]: Failed password for root from 103.126.100.179 port 49918 ssh2
Nov  1 21:21:17 ovpn sshd\[13758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.179  user=root
Nov  1 21:21:19 ovpn sshd\[13758\]: Failed password for root from 103.126.100.179 port 36474 ssh2
Nov  1 21:26:36 ovpn sshd\[14805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.179  user=root
2019-11-02 05:33:22

Recently Reported IPs

104.16.189.233 104.16.190.233 168.213.152.94 104.16.190.48
104.16.193.165 104.16.196.79 104.16.2.100 104.16.2.101
184.175.88.187 104.16.2.102 104.16.2.103 104.16.2.104
104.16.2.105 212.141.156.122 104.16.2.106 104.16.2.108
250.209.108.210 212.139.130.13 104.16.2.109 104.16.2.110