Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.194.235.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.194.235.212.		IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 06:38:25 CST 2022
;; MSG SIZE  rcvd: 108
Host info
212.235.194.104.in-addr.arpa domain name pointer host-104-194-235-212-by.multacom.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.235.194.104.in-addr.arpa	name = host-104-194-235-212-by.multacom.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.172.148.56 attackbots
22802/tcp 16173/tcp 30051/tcp...
[2020-04-12/05-06]68pkt,24pt.(tcp)
2020-05-07 02:38:51
162.243.144.33 attack
scans once in preceeding hours on the ports (in chronological order) 1521 resulting in total of 58 scans from 162.243.0.0/16 block.
2020-05-07 02:44:29
45.143.220.20 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-05-07 02:24:13
184.105.139.83 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 11211 resulting in total of 8 scans from 184.105.0.0/16 block.
2020-05-07 02:37:04
112.135.197.209 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 7322 7322
2020-05-07 02:14:33
125.46.11.67 attackspambots
6381/tcp 6380/tcp 6378/tcp...
[2020-04-05/05-06]217pkt,4pt.(tcp)
2020-05-07 02:13:08
185.176.27.34 attack
Fail2Ban Ban Triggered
2020-05-07 02:33:20
162.243.144.181 attackbots
Port probing on unauthorized port 514
2020-05-07 02:43:15
162.243.142.126 attack
scans once in preceeding hours on the ports (in chronological order) 21919 resulting in total of 58 scans from 162.243.0.0/16 block.
2020-05-07 02:49:02
125.64.94.220 attackbots
[21:00:38] (YnM): [21:00:36] Telnet connection: 125.64.94.220/49200
[21:00:39] (YnM): [21:00:36] EOF ident connection
[21:00:39] (YnM): [21:00:36] Refused telnet@125.64.94.220 (invalid handle: GET / HTTP/1.0)
2020-05-07 02:12:39
113.214.30.171 attack
" "
2020-05-07 02:14:16
192.241.230.228 attackspam
05/06/2020-08:37:33.595907 192.241.230.228 Protocol: 17 GPL SQL ping attempt
2020-05-07 02:31:07
62.210.105.231 attackbots
scans 3 times in preceeding hours on the ports (in chronological order) 11211 1900 11211
2020-05-07 02:20:01
162.243.142.64 attackspambots
scans once in preceeding hours on the ports (in chronological order) 5006 resulting in total of 58 scans from 162.243.0.0/16 block.
2020-05-07 02:49:24
162.243.145.46 attackspam
scans once in preceeding hours on the ports (in chronological order) 50070 resulting in total of 58 scans from 162.243.0.0/16 block.
2020-05-07 02:41:05

Recently Reported IPs

104.194.225.76 104.194.8.220 104.195.0.251 104.195.35.44
104.195.36.13 104.196.10.46 104.196.101.60 104.196.101.92
104.196.104.68 104.196.106.27 104.196.111.195 178.186.94.238
104.196.120.130 104.196.120.175 104.196.127.210 104.196.133.51
104.196.142.200 104.196.150.116 104.196.172.128 104.196.175.174