Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Toronto

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.200.141.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.200.141.12.			IN	A

;; AUTHORITY SECTION:
.			90	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 09:16:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 12.141.200.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.141.200.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.50.149.11 attackspambots
May 11 20:47:42 relay postfix/smtpd\[6641\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 20:48:05 relay postfix/smtpd\[7131\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 20:53:10 relay postfix/smtpd\[20723\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 20:53:34 relay postfix/smtpd\[20723\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 20:54:10 relay postfix/smtpd\[18145\]: warning: unknown\[185.50.149.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-12 02:57:00
111.229.34.241 attackspam
May 11 09:08:09 lanister sshd[6115]: Invalid user guest from 111.229.34.241
May 11 09:08:09 lanister sshd[6115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.34.241
May 11 09:08:09 lanister sshd[6115]: Invalid user guest from 111.229.34.241
May 11 09:08:12 lanister sshd[6115]: Failed password for invalid user guest from 111.229.34.241 port 52504 ssh2
2020-05-12 02:34:26
27.22.111.17 attackbots
SASL broute force
2020-05-12 02:22:08
184.154.47.6 attackspam
trying to access non-authorized port
2020-05-12 02:54:46
177.74.144.198 attackspam
May 11 15:23:15 dns1 sshd[9601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.74.144.198 
May 11 15:23:18 dns1 sshd[9601]: Failed password for invalid user hand from 177.74.144.198 port 32949 ssh2
May 11 15:32:33 dns1 sshd[9975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.74.144.198
2020-05-12 02:45:19
51.15.251.74 attackspam
May 11 20:06:19 [host] sshd[11156]: Invalid user t
May 11 20:06:19 [host] sshd[11156]: pam_unix(sshd:
May 11 20:06:22 [host] sshd[11156]: Failed passwor
2020-05-12 02:34:06
170.130.18.5 attackbotsspam
2020-05-11 06:49:25.304723-0500  localhost smtpd[63622]: NOQUEUE: reject: RCPT from unknown[170.130.18.5]: 554 5.7.1 Service unavailable; Client host [170.130.18.5] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from=<12735-128-542470-3325-mgs=customvisuals.com@mail.hear.guru> to= proto=ESMTP helo=
2020-05-12 02:47:41
134.175.154.93 attackspambots
May 11 14:03:30 mail sshd\[11056\]: Invalid user pie from 134.175.154.93
May 11 14:03:30 mail sshd\[11056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.154.93
May 11 14:03:32 mail sshd\[11056\]: Failed password for invalid user pie from 134.175.154.93 port 38074 ssh2
...
2020-05-12 02:20:32
83.30.57.166 attackspambots
Lines containing failures of 83.30.57.166 (max 1000)
May 11 15:03:11 UTC__SANYALnet-Labs__cac12 sshd[26886]: Connection from 83.30.57.166 port 56004 on 64.137.176.104 port 22
May 11 15:03:15 UTC__SANYALnet-Labs__cac12 sshd[26886]: Failed password for invalid user r.r from 83.30.57.166 port 56004 ssh2
May 11 15:03:16 UTC__SANYALnet-Labs__cac12 sshd[26886]: Received disconnect from 83.30.57.166 port 56004:11: Bye Bye [preauth]
May 11 15:03:16 UTC__SANYALnet-Labs__cac12 sshd[26886]: Disconnected from 83.30.57.166 port 56004 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=83.30.57.166
2020-05-12 02:48:31
120.31.138.82 attackspambots
2020-05-11T09:07:27.9494401495-001 sshd[22550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.31.138.82  user=dbus
2020-05-11T09:07:30.3064401495-001 sshd[22550]: Failed password for dbus from 120.31.138.82 port 45575 ssh2
2020-05-11T09:11:31.0564981495-001 sshd[22742]: Invalid user mike from 120.31.138.82 port 41075
2020-05-11T09:11:31.0644321495-001 sshd[22742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.31.138.82
2020-05-11T09:11:31.0564981495-001 sshd[22742]: Invalid user mike from 120.31.138.82 port 41075
2020-05-11T09:11:32.5835381495-001 sshd[22742]: Failed password for invalid user mike from 120.31.138.82 port 41075 ssh2
...
2020-05-12 02:54:00
198.211.126.154 attack
(sshd) Failed SSH login from 198.211.126.154 (NL/Netherlands/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 11 13:35:36 andromeda sshd[28738]: Invalid user sci from 198.211.126.154 port 56130
May 11 13:35:38 andromeda sshd[28738]: Failed password for invalid user sci from 198.211.126.154 port 56130 ssh2
May 11 13:40:50 andromeda sshd[29052]: Invalid user roberts from 198.211.126.154 port 58004
2020-05-12 02:34:37
45.225.92.89 attack
1589198575 - 05/11/2020 14:02:55 Host: 45.225.92.89/45.225.92.89 Port: 445 TCP Blocked
2020-05-12 02:56:32
116.196.94.211 attack
Bruteforce detected by fail2ban
2020-05-12 02:24:15
106.54.184.153 attackspam
May 11 11:24:21 pixelmemory sshd[174780]: Failed password for invalid user www from 106.54.184.153 port 38264 ssh2
May 11 11:27:26 pixelmemory sshd[175455]: Invalid user francis from 106.54.184.153 port 40854
May 11 11:27:26 pixelmemory sshd[175455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.184.153 
May 11 11:27:26 pixelmemory sshd[175455]: Invalid user francis from 106.54.184.153 port 40854
May 11 11:27:28 pixelmemory sshd[175455]: Failed password for invalid user francis from 106.54.184.153 port 40854 ssh2
...
2020-05-12 02:44:00
92.154.95.236 attack
Port scan on 6 port(s): 3260 4899 5440 5962 16018 65129
2020-05-12 02:58:08

Recently Reported IPs

104.152.57.179 78.84.31.133 124.130.30.232 177.87.1.27
176.124.210.44 82.77.126.45 147.78.244.237 91.234.32.102
91.80.154.41 91.53.56.177 34.229.106.31 68.183.118.70
221.221.145.51 89.113.101.20 110.183.19.139 123.244.88.16
117.20.225.34 58.219.91.39 185.162.228.60 209.141.56.216