Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.197.104.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.197.104.42.			IN	A

;; AUTHORITY SECTION:
.			389	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 11:38:26 CST 2022
;; MSG SIZE  rcvd: 107
Host info
42.104.197.104.in-addr.arpa domain name pointer 42.104.197.104.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.104.197.104.in-addr.arpa	name = 42.104.197.104.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.172.211.34 attack
Invalid user admin from 113.172.211.34 port 53151
2019-08-23 16:00:18
14.215.46.94 attackspam
Aug 23 06:49:47 root sshd[26402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.46.94 
Aug 23 06:49:50 root sshd[26402]: Failed password for invalid user hadoop from 14.215.46.94 port 53430 ssh2
Aug 23 07:11:00 root sshd[26686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.46.94 
...
2019-08-23 14:57:08
122.152.218.213 attackbots
Aug 22 21:07:52 lcdev sshd\[26447\]: Invalid user peace from 122.152.218.213
Aug 22 21:07:52 lcdev sshd\[26447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.218.213
Aug 22 21:07:55 lcdev sshd\[26447\]: Failed password for invalid user peace from 122.152.218.213 port 58325 ssh2
Aug 22 21:13:19 lcdev sshd\[27101\]: Invalid user davidc from 122.152.218.213
Aug 22 21:13:19 lcdev sshd\[27101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.218.213
2019-08-23 15:25:57
68.183.124.72 attack
Invalid user cvs from 68.183.124.72 port 47752
2019-08-23 14:50:14
119.163.251.111 attack
Invalid user pi from 119.163.251.111 port 24894
2019-08-23 15:57:18
103.206.246.254 attackbots
Invalid user admin2 from 103.206.246.254 port 53346
2019-08-23 15:30:12
106.51.143.129 attackspam
Invalid user admin from 106.51.143.129 port 37320
2019-08-23 15:28:39
139.59.39.174 attackbots
Invalid user bdoherty from 139.59.39.174 port 55306
2019-08-23 15:22:05
188.226.167.212 attack
Invalid user cj from 188.226.167.212 port 50748
2019-08-23 15:48:16
116.196.83.143 attack
Bruteforce on SSH Honeypot
2019-08-23 15:59:32
51.38.236.107 attackspam
Invalid user admin from 51.38.236.107 port 35224
2019-08-23 15:37:08
67.205.142.212 attackbotsspam
Aug 23 09:23:41 plex sshd[21554]: Invalid user viet from 67.205.142.212 port 44650
2019-08-23 15:35:32
165.22.30.235 attack
$f2bV_matches
2019-08-23 15:15:21
89.234.157.254 attack
Invalid user james from 89.234.157.254 port 41325
2019-08-23 15:33:03
128.199.162.108 attackspambots
Invalid user iv from 128.199.162.108 port 59620
2019-08-23 15:24:51

Recently Reported IPs

104.197.100.6 104.197.151.58 104.197.210.200 104.197.2.255
104.197.219.204 104.197.108.2 104.197.151.1 104.197.236.30
104.197.85.218 104.197.221.232 104.197.225.144 104.197.59.101
104.198.100.204 104.198.10.5 104.197.224.127 104.198.104.53
104.198.0.31 104.198.12.17 104.198.104.86 104.197.63.123