Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.196.113.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.196.113.214.		IN	A

;; AUTHORITY SECTION:
.			139	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:58:48 CST 2022
;; MSG SIZE  rcvd: 108
Host info
214.113.196.104.in-addr.arpa domain name pointer 214.113.196.104.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.113.196.104.in-addr.arpa	name = 214.113.196.104.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.68.213.49 attackbotsspam
fail2ban honeypot
2019-11-05 23:54:30
124.127.145.135 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-06 00:12:36
146.185.25.171 attackbots
DNS Enumeration
2019-11-05 23:55:35
182.162.143.236 attackbots
2019-11-05T15:41:26.146129abusebot-5.cloudsearch.cf sshd\[27410\]: Invalid user keith from 182.162.143.236 port 46344
2019-11-05 23:57:18
194.36.174.15 attack
SSH invalid-user multiple login try
2019-11-05 23:38:20
186.10.185.208 attack
PHI,WP GET /wp-login.php
2019-11-05 23:53:38
216.218.206.77 attack
firewall-block, port(s): 50070/tcp
2019-11-06 00:02:05
176.84.194.169 attackbots
ENG,WP GET /wp-login.php
2019-11-05 23:58:25
111.230.247.104 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.104  user=root
Failed password for root from 111.230.247.104 port 38645 ssh2
Invalid user napporn from 111.230.247.104 port 57203
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.104
Failed password for invalid user napporn from 111.230.247.104 port 57203 ssh2
2019-11-05 23:36:08
103.82.32.7 attackspam
Message ID	
Created at:	Tue, Nov 5, 2019 at 8:39 AM (Delivered after -1 seconds)
From:	HavenLock Offer 
To:	me@cisco.com.uk
Subject:	Are you safe in your own home?
SPF:	SOFTFAIL with IP 103.82.32.7
2019-11-05 23:48:28
45.55.88.94 attackspam
Nov  5 16:21:25 srv01 sshd[1381]: Invalid user test from 45.55.88.94
Nov  5 16:21:25 srv01 sshd[1381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=retailnes.com
Nov  5 16:21:25 srv01 sshd[1381]: Invalid user test from 45.55.88.94
Nov  5 16:21:27 srv01 sshd[1381]: Failed password for invalid user test from 45.55.88.94 port 50834 ssh2
Nov  5 16:26:52 srv01 sshd[1866]: Invalid user ibmadrc from 45.55.88.94
...
2019-11-05 23:37:40
176.118.30.155 attack
Nov  5 15:40:47 * sshd[12560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.118.30.155
Nov  5 15:40:49 * sshd[12560]: Failed password for invalid user test from 176.118.30.155 port 42974 ssh2
2019-11-05 23:49:34
51.15.190.180 attack
2019-11-05T15:12:11.892920shield sshd\[1531\]: Invalid user monkey from 51.15.190.180 port 52506
2019-11-05T15:12:11.898799shield sshd\[1531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.190.180
2019-11-05T15:12:13.555338shield sshd\[1531\]: Failed password for invalid user monkey from 51.15.190.180 port 52506 ssh2
2019-11-05T15:18:17.030453shield sshd\[2429\]: Invalid user hellhole from 51.15.190.180 port 34288
2019-11-05T15:18:17.037499shield sshd\[2429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.190.180
2019-11-05 23:31:52
200.16.132.202 attack
2019-11-05T15:49:17.732019abusebot-8.cloudsearch.cf sshd\[24802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202  user=root
2019-11-06 00:07:08
185.234.217.194 attackspambots
login attempts
2019-11-06 00:11:42

Recently Reported IPs

212.42.103.180 104.196.115.33 104.196.122.85 104.196.12.201
104.196.118.173 104.196.129.222 104.21.66.146 104.196.128.125
104.196.114.153 104.196.130.212 104.196.130.204 104.196.13.119
104.196.132.110 104.196.133.3 104.196.139.39 104.196.124.155
104.196.138.223 104.196.14.150 104.196.141.80 104.21.66.147