Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.219.214.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23421
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.219.214.124.		IN	A

;; AUTHORITY SECTION:
.			265	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:43:04 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 124.214.219.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 124.214.219.104.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
52.149.160.100 attack
Port Scan: TCP/443
2020-09-12 16:58:19
106.52.199.130 attack
(sshd) Failed SSH login from 106.52.199.130 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 11 23:40:57 optimus sshd[17785]: Invalid user user from 106.52.199.130
Sep 11 23:40:57 optimus sshd[17785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.199.130 
Sep 11 23:40:59 optimus sshd[17785]: Failed password for invalid user user from 106.52.199.130 port 53524 ssh2
Sep 11 23:45:30 optimus sshd[21733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.199.130  user=root
Sep 11 23:45:32 optimus sshd[21733]: Failed password for root from 106.52.199.130 port 50158 ssh2
2020-09-12 17:21:31
197.58.102.58 attack
Port Scan detected!
...
2020-09-12 17:06:31
141.98.80.188 attackspambots
Sep 12 10:29:21 web02.agentur-b-2.de postfix/smtpd[1817545]: warning: unknown[141.98.80.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 10:29:21 web02.agentur-b-2.de postfix/smtpd[1817545]: lost connection after AUTH from unknown[141.98.80.188]
Sep 12 10:29:26 web02.agentur-b-2.de postfix/smtpd[1816385]: lost connection after AUTH from unknown[141.98.80.188]
Sep 12 10:29:31 web02.agentur-b-2.de postfix/smtpd[1817545]: lost connection after AUTH from unknown[141.98.80.188]
Sep 12 10:29:36 web02.agentur-b-2.de postfix/smtpd[1816385]: lost connection after AUTH from unknown[141.98.80.188]
2020-09-12 17:03:37
54.37.205.241 attackspam
SSH Brute Force
2020-09-12 17:18:02
218.92.0.250 attackspambots
Sep 12 11:14:42 theomazars sshd[26504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Sep 12 11:14:44 theomazars sshd[26504]: Failed password for root from 218.92.0.250 port 2060 ssh2
2020-09-12 17:24:57
194.165.99.231 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-09-12 17:16:37
122.116.56.81 attack
 TCP (SYN) 122.116.56.81:25591 -> port 23, len 40
2020-09-12 17:25:41
106.12.217.204 attackbots
Sep 12 09:59:49 root sshd[19838]: Failed password for root from 106.12.217.204 port 40692 ssh2
Sep 12 10:01:15 root sshd[21097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.217.204 
...
2020-09-12 17:00:22
60.243.231.74 attackspambots
" "
2020-09-12 17:17:27
216.126.239.38 attack
Sep 12 10:47:32 haigwepa sshd[12530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.126.239.38 
Sep 12 10:47:34 haigwepa sshd[12530]: Failed password for invalid user oracle from 216.126.239.38 port 35250 ssh2
...
2020-09-12 17:01:31
202.83.44.109 attackbotsspam
REQUESTED PAGE: /GponForm/diag_Form?images/
2020-09-12 17:19:08
212.244.23.96 attackspambots
Sep 11 18:19:31 mail.srvfarm.net postfix/smtpd[3890715]: warning: unknown[212.244.23.96]: SASL PLAIN authentication failed: 
Sep 11 18:19:31 mail.srvfarm.net postfix/smtpd[3890715]: lost connection after AUTH from unknown[212.244.23.96]
Sep 11 18:22:04 mail.srvfarm.net postfix/smtps/smtpd[3892333]: warning: unknown[212.244.23.96]: SASL PLAIN authentication failed: 
Sep 11 18:22:04 mail.srvfarm.net postfix/smtps/smtpd[3892333]: lost connection after AUTH from unknown[212.244.23.96]
Sep 11 18:24:47 mail.srvfarm.net postfix/smtps/smtpd[3892326]: warning: unknown[212.244.23.96]: SASL PLAIN authentication failed:
2020-09-12 17:31:24
193.169.252.210 attackbots
2020-09-12 10:43:11 dovecot_login authenticator failed for \(User\) \[193.169.252.210\]: 535 Incorrect authentication data \(set_id=avto\)
2020-09-12 10:43:11 dovecot_login authenticator failed for \(User\) \[193.169.252.210\]: 535 Incorrect authentication data \(set_id=avto\)
2020-09-12 10:43:11 dovecot_login authenticator failed for \(User\) \[193.169.252.210\]: 535 Incorrect authentication data \(set_id=avto\)
2020-09-12 10:50:24 dovecot_login authenticator failed for \(User\) \[193.169.252.210\]: 535 Incorrect authentication data \(set_id=aya\)
2020-09-12 10:50:24 dovecot_login authenticator failed for \(User\) \[193.169.252.210\]: 535 Incorrect authentication data \(set_id=aya\)
2020-09-12 10:50:24 dovecot_login authenticator failed for \(User\) \[193.169.252.210\]: 535 Incorrect authentication data \(set_id=aya\)
...
2020-09-12 17:02:25
152.136.237.47 attackspam
Sep 12 04:24:20 george sshd[12433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.237.47 
Sep 12 04:24:21 george sshd[12433]: Failed password for invalid user avi from 152.136.237.47 port 56648 ssh2
Sep 12 04:29:05 george sshd[14023]: Invalid user artwork from 152.136.237.47 port 50368
Sep 12 04:29:05 george sshd[14023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.237.47 
Sep 12 04:29:06 george sshd[14023]: Failed password for invalid user artwork from 152.136.237.47 port 50368 ssh2
...
2020-09-12 17:14:19

Recently Reported IPs

104.218.51.248 104.219.232.75 104.219.248.106 104.219.248.246
104.219.248.39 104.219.251.22 104.219.53.67 104.219.54.123
104.219.55.31 104.219.77.144 104.22.0.120 104.22.0.14
104.22.0.20 104.22.0.207 104.22.0.221 104.22.0.25
104.22.0.36 104.22.0.55 104.22.0.81 104.22.1.238