Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.200.139.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.200.139.234.		IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:01:30 CST 2022
;; MSG SIZE  rcvd: 108
Host info
234.139.200.104.in-addr.arpa domain name pointer ogletree.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
234.139.200.104.in-addr.arpa	name = ogletree.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.6.72.17 attackspambots
2020-05-10T19:32:10.551475sd-86998 sshd[37456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17.leonetprovedor.com.br  user=root
2020-05-10T19:32:12.154291sd-86998 sshd[37456]: Failed password for root from 45.6.72.17 port 44636 ssh2
2020-05-10T19:34:21.730336sd-86998 sshd[37715]: Invalid user dspace from 45.6.72.17 port 48864
2020-05-10T19:34:21.735456sd-86998 sshd[37715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17.leonetprovedor.com.br
2020-05-10T19:34:21.730336sd-86998 sshd[37715]: Invalid user dspace from 45.6.72.17 port 48864
2020-05-10T19:34:23.654499sd-86998 sshd[37715]: Failed password for invalid user dspace from 45.6.72.17 port 48864 ssh2
...
2020-05-11 02:10:05
39.9.199.58 attackbotsspam
Honeypot attack, port: 445, PTR: 39-9-199-58.adsl.fetnet.net.
2020-05-11 02:33:08
125.71.225.229 attackbots
1589112610 - 05/10/2020 14:10:10 Host: 125.71.225.229/125.71.225.229 Port: 445 TCP Blocked
2020-05-11 02:02:03
24.240.40.33 attackbotsspam
May 10 14:04:04 xeon sshd[59661]: Failed password for invalid user oracle from 24.240.40.33 port 49942 ssh2
2020-05-11 02:15:52
167.99.66.193 attackspam
srv02 SSH BruteForce Attacks 22 ..
2020-05-11 02:32:14
220.165.15.228 attackspam
(sshd) Failed SSH login from 220.165.15.228 (CN/China/-): 5 in the last 3600 secs
2020-05-11 02:16:55
152.136.190.55 attackspam
May 10 20:12:49 plex sshd[1608]: Invalid user zf from 152.136.190.55 port 53276
2020-05-11 02:24:00
104.236.72.182 attackspambots
May 10 15:04:17 firewall sshd[13927]: Invalid user design from 104.236.72.182
May 10 15:04:19 firewall sshd[13927]: Failed password for invalid user design from 104.236.72.182 port 47245 ssh2
May 10 15:09:33 firewall sshd[14013]: Invalid user amber from 104.236.72.182
...
2020-05-11 02:25:33
157.245.183.64 attackbots
xmlrpc attack
2020-05-11 02:09:34
172.81.205.236 attackspambots
detected by Fail2Ban
2020-05-11 01:57:56
79.124.62.82 attackbots
 TCP (SYN) 79.124.62.82:40142 -> port 4445, len 44
2020-05-11 02:15:00
201.123.121.65 attackbots
Honeypot attack, port: 445, PTR: dsl-201-123-121-65-dyn.prod-infinitum.com.mx.
2020-05-11 02:31:01
116.98.119.181 attackspambots
Fail2Ban Ban Triggered
2020-05-11 02:04:53
129.226.67.136 attackspam
May 10 18:40:48 srv206 sshd[30400]: Invalid user testuser from 129.226.67.136
May 10 18:40:48 srv206 sshd[30400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.136
May 10 18:40:48 srv206 sshd[30400]: Invalid user testuser from 129.226.67.136
May 10 18:40:50 srv206 sshd[30400]: Failed password for invalid user testuser from 129.226.67.136 port 57450 ssh2
...
2020-05-11 02:00:36
181.188.191.226 attackspambots
Honeypot attack, port: 445, PTR: LPZ-181-188-191-00226.tigo.bo.
2020-05-11 02:13:35

Recently Reported IPs

108.179.242.164 108.179.242.23 108.179.242.60 108.179.242.65
108.179.242.46 108.179.242.61 108.179.243.164 108.179.243.134
108.179.243.19 104.200.146.128 108.179.243.199 108.179.243.33
104.200.146.144 104.200.159.141 104.200.16.11 108.179.247.33
108.179.252.169 108.179.250.1 108.179.246.82 108.179.252.147