Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.200.72.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11727
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.200.72.117.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:51:26 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 117.72.200.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 117.72.200.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.111.95.84 attackbots
Invalid user pi from 106.111.95.84 port 52531
2019-07-13 15:34:13
117.247.192.100 attack
Invalid user admin from 117.247.192.100 port 54687
2019-07-13 15:33:02
128.199.242.84 attackbots
Jul 13 09:22:20 62-210-73-4 sshd\[7305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.242.84  user=root
Jul 13 09:22:22 62-210-73-4 sshd\[7305\]: Failed password for root from 128.199.242.84 port 54617 ssh2
...
2019-07-13 15:31:20
180.108.59.165 attackspam
Invalid user admin from 180.108.59.165 port 54701
2019-07-13 15:23:01
68.183.105.52 attackspam
2019-07-13T07:25:44.366517abusebot-7.cloudsearch.cf sshd\[26666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.52  user=root
2019-07-13 15:42:48
223.99.126.67 attack
Invalid user mongouser from 223.99.126.67 port 47194
2019-07-13 15:50:15
190.57.72.70 attackspam
Invalid user chico from 190.57.72.70 port 47564
2019-07-13 15:57:22
180.246.151.111 attack
Invalid user tit0nich from 180.246.151.111 port 10087
2019-07-13 15:21:34
103.94.69.10 attackbotsspam
Invalid user noc from 103.94.69.10 port 53006
2019-07-13 15:36:37
14.248.63.9 attackbots
Invalid user admin from 14.248.63.9 port 54392
2019-07-13 15:13:29
178.128.55.52 attackspambots
Jul 13 08:26:12 ns37 sshd[9474]: Failed password for root from 178.128.55.52 port 46153 ssh2
Jul 13 08:26:12 ns37 sshd[9474]: Failed password for root from 178.128.55.52 port 46153 ssh2
Jul 13 08:35:35 ns37 sshd[9893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.52
2019-07-13 15:23:22
118.200.199.43 attack
Invalid user demouser from 118.200.199.43 port 46482
2019-07-13 15:32:30
201.91.132.170 attack
Invalid user e from 201.91.132.170 port 33871
2019-07-13 15:53:42
172.245.56.247 attack
Invalid user loginuser from 172.245.56.247 port 60600
2019-07-13 15:24:18
159.65.54.221 attackbotsspam
Invalid user lukasz from 159.65.54.221 port 51942
2019-07-13 15:27:12

Recently Reported IPs

104.187.188.213 228.130.84.72 160.225.229.73 36.86.48.196
254.161.167.75 41.138.41.106 164.76.83.91 118.159.193.185
187.140.206.93 207.53.60.72 21.204.88.51 58.46.136.108
112.110.44.151 16.181.75.167 186.182.236.6 254.168.142.243
227.212.134.14 181.1.145.140 36.173.38.89 94.128.109.14