Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.39.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.39.64.			IN	A

;; AUTHORITY SECTION:
.			412	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:37:14 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 64.39.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.39.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
149.56.16.168 attack
Sep 24 17:14:02 ny01 sshd[2639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.16.168
Sep 24 17:14:04 ny01 sshd[2639]: Failed password for invalid user adonis from 149.56.16.168 port 54546 ssh2
Sep 24 17:17:53 ny01 sshd[3269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.16.168
2019-09-25 05:28:22
2.180.181.38 attackspambots
Unauthorized connection attempt from IP address 2.180.181.38 on Port 445(SMB)
2019-09-25 05:15:38
92.188.124.228 attack
Invalid user him from 92.188.124.228 port 58480
2019-09-25 05:05:51
200.145.153.172 attackspam
Sep 24 17:17:56 plusreed sshd[26801]: Invalid user tx from 200.145.153.172
Sep 24 17:17:56 plusreed sshd[26801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.145.153.172
Sep 24 17:17:56 plusreed sshd[26801]: Invalid user tx from 200.145.153.172
Sep 24 17:17:58 plusreed sshd[26801]: Failed password for invalid user tx from 200.145.153.172 port 53520 ssh2
...
2019-09-25 05:25:11
37.59.45.134 attack
[portscan] Port scan
2019-09-25 05:06:47
104.250.108.94 attackspam
Sep 24 23:54:05 diego postfix/smtpd\[31603\]: warning: unknown\[104.250.108.94\]: SASL LOGIN authentication failed: authentication failure
...
2019-09-25 05:05:33
58.213.198.77 attackspambots
Sep 24 14:31:40 MainVPS sshd[27379]: Invalid user vonzant from 58.213.198.77 port 41328
Sep 24 14:31:40 MainVPS sshd[27379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77
Sep 24 14:31:40 MainVPS sshd[27379]: Invalid user vonzant from 58.213.198.77 port 41328
Sep 24 14:31:42 MainVPS sshd[27379]: Failed password for invalid user vonzant from 58.213.198.77 port 41328 ssh2
Sep 24 14:34:46 MainVPS sshd[27577]: Invalid user rootme from 58.213.198.77 port 39400
...
2019-09-25 05:15:20
192.126.164.180 attackbots
Unauthorized access detected from banned ip
2019-09-25 05:00:50
159.203.182.127 attack
Invalid user gituser from 159.203.182.127 port 54169
2019-09-25 05:05:17
157.230.109.166 attackbots
Sep 24 23:15:53 vps691689 sshd[10548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.109.166
Sep 24 23:15:55 vps691689 sshd[10548]: Failed password for invalid user akhil from 157.230.109.166 port 34592 ssh2
...
2019-09-25 05:30:55
167.99.75.143 attackspambots
Sep 24 07:11:31 php1 sshd\[5039\]: Invalid user oms from 167.99.75.143
Sep 24 07:11:31 php1 sshd\[5039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.143
Sep 24 07:11:33 php1 sshd\[5039\]: Failed password for invalid user oms from 167.99.75.143 port 37014 ssh2
Sep 24 07:15:58 php1 sshd\[5560\]: Invalid user administrador from 167.99.75.143
Sep 24 07:15:58 php1 sshd\[5560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.143
2019-09-25 04:53:38
138.97.37.53 attackbots
1588/tcp 9200/tcp 8000/tcp
[2019-09-22]3pkt
2019-09-25 05:20:45
103.7.8.212 attack
ft-1848-fussball.de 103.7.8.212 \[24/Sep/2019:23:17:57 +0200\] "POST /wp-login.php HTTP/1.1" 200 2299 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
ft-1848-fussball.de 103.7.8.212 \[24/Sep/2019:23:17:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 2264 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-25 05:26:06
157.230.58.196 attackspam
Sep 25 00:14:18 site3 sshd\[36582\]: Invalid user yyyyy from 157.230.58.196
Sep 25 00:14:18 site3 sshd\[36582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.58.196
Sep 25 00:14:20 site3 sshd\[36582\]: Failed password for invalid user yyyyy from 157.230.58.196 port 40782 ssh2
Sep 25 00:17:50 site3 sshd\[36622\]: Invalid user rosaline from 157.230.58.196
Sep 25 00:17:50 site3 sshd\[36622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.58.196
...
2019-09-25 05:31:22
220.173.55.8 attackspambots
2019-09-24T22:51:42.860661  sshd[19839]: Invalid user florian from 220.173.55.8 port 48898
2019-09-24T22:51:42.877076  sshd[19839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.173.55.8
2019-09-24T22:51:42.860661  sshd[19839]: Invalid user florian from 220.173.55.8 port 48898
2019-09-24T22:51:44.744006  sshd[19839]: Failed password for invalid user florian from 220.173.55.8 port 48898 ssh2
2019-09-24T23:18:01.030351  sshd[20182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.173.55.8  user=root
2019-09-24T23:18:03.334909  sshd[20182]: Failed password for root from 220.173.55.8 port 19463 ssh2
...
2019-09-25 05:21:56

Recently Reported IPs

104.16.39.56 104.16.4.40 104.16.4.47 104.16.4.91
104.16.4.41 104.21.63.61 104.16.40.64 104.16.40.12
104.16.41.196 104.16.41.12 104.16.42.102 104.16.42.19
104.16.43.102 104.16.42.72 104.16.43.19 104.16.42.196
104.16.42.92 104.16.43.62 104.16.40.56 104.16.43.196