Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Central

Region: Central and Western District

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.208.114.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.208.114.29.			IN	A

;; AUTHORITY SECTION:
.			177	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052502 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 26 06:17:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 29.114.208.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.114.208.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.149.182.124 attackbots
Automatic report - Banned IP Access
2020-06-27 15:57:03
180.76.238.70 attackbotsspam
Jun 27 14:01:16 itv-usvr-02 sshd[12088]: Invalid user lgi from 180.76.238.70 port 38238
Jun 27 14:01:16 itv-usvr-02 sshd[12088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.238.70
Jun 27 14:01:16 itv-usvr-02 sshd[12088]: Invalid user lgi from 180.76.238.70 port 38238
Jun 27 14:01:18 itv-usvr-02 sshd[12088]: Failed password for invalid user lgi from 180.76.238.70 port 38238 ssh2
Jun 27 14:05:32 itv-usvr-02 sshd[12226]: Invalid user dana from 180.76.238.70 port 54236
2020-06-27 15:51:31
47.104.254.190 attack
2020-06-27T09:05:57.246004hostname sshd[4231]: Invalid user gp from 47.104.254.190 port 46196
2020-06-27T09:05:59.228878hostname sshd[4231]: Failed password for invalid user gp from 47.104.254.190 port 46196 ssh2
2020-06-27T09:11:24.166162hostname sshd[8107]: Invalid user postgres from 47.104.254.190 port 46570
...
2020-06-27 15:58:47
14.250.19.93 attackspambots
(ftpd) Failed FTP login from 14.250.19.93 (VN/Vietnam/static.vnpt.vn): 10 in the last 3600 secs; ID: rub
2020-06-27 16:18:33
106.52.93.51 attack
Jun 27 05:46:28 h2779839 sshd[14575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.51  user=root
Jun 27 05:46:30 h2779839 sshd[14575]: Failed password for root from 106.52.93.51 port 60654 ssh2
Jun 27 05:49:37 h2779839 sshd[20549]: Invalid user wsp from 106.52.93.51 port 38492
Jun 27 05:49:37 h2779839 sshd[20549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.51
Jun 27 05:49:37 h2779839 sshd[20549]: Invalid user wsp from 106.52.93.51 port 38492
Jun 27 05:49:38 h2779839 sshd[20549]: Failed password for invalid user wsp from 106.52.93.51 port 38492 ssh2
Jun 27 05:52:33 h2779839 sshd[22270]: Invalid user mwang from 106.52.93.51 port 44566
Jun 27 05:52:33 h2779839 sshd[22270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.51
Jun 27 05:52:33 h2779839 sshd[22270]: Invalid user mwang from 106.52.93.51 port 44566
Jun 27 05:52:36 h2779839 s
...
2020-06-27 16:17:30
178.128.168.87 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-06-27 16:13:52
27.72.31.14 attack
1593229992 - 06/27/2020 05:53:12 Host: 27.72.31.14/27.72.31.14 Port: 445 TCP Blocked
2020-06-27 15:41:24
103.236.134.13 attack
Fail2Ban Ban Triggered
2020-06-27 15:52:53
165.22.94.219 attackbots
165.22.94.219 - - [27/Jun/2020:07:40:10 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.94.219 - - [27/Jun/2020:07:40:11 +0100] "POST /wp-login.php HTTP/1.1" 200 1947 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.94.219 - - [27/Jun/2020:07:40:11 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-27 16:06:57
23.100.89.28 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-06-27 15:59:09
144.172.79.5 attackbotsspam
prod6
...
2020-06-27 16:14:25
46.229.168.147 attackbots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-06-27 16:12:02
221.15.218.59 attack
unauthorized connection attempt
2020-06-27 15:44:12
113.239.249.149 attack
Email rejected due to spam filtering
2020-06-27 15:42:17
116.196.94.108 attack
Invalid user neel from 116.196.94.108 port 40140
2020-06-27 15:47:21

Recently Reported IPs

104.208.112.161 104.208.79.228 104.209.182.25 104.21.108.16
104.21.224.177 104.21.224.73 104.21.229.68 104.21.231.86
104.21.236.223 104.21.238.241 104.21.239.176 104.211.18.73
104.211.66.134 104.211.89.13 104.214.20.27 104.215.7.26
104.217.119.38 104.217.205.111 104.217.253.49 104.218.234.2