Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.224.217.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54219
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.224.217.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 19:40:57 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 142.217.224.104.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 104.224.217.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.244.143.233 attackbotsspam
Excessive Port-Scanning
2019-08-09 09:49:15
49.231.222.1 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:35:55,699 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.231.222.1)
2019-08-09 09:51:41
99.45.149.229 attackspambots
Aug  9 04:49:30 itv-usvr-01 sshd[30853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.45.149.229  user=root
Aug  9 04:49:31 itv-usvr-01 sshd[30853]: Failed password for root from 99.45.149.229 port 60506 ssh2
Aug  9 04:49:32 itv-usvr-01 sshd[30855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.45.149.229  user=root
Aug  9 04:49:34 itv-usvr-01 sshd[30855]: Failed password for root from 99.45.149.229 port 33094 ssh2
Aug  9 04:49:36 itv-usvr-01 sshd[30857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.45.149.229  user=root
Aug  9 04:49:38 itv-usvr-01 sshd[30857]: Failed password for root from 99.45.149.229 port 34056 ssh2
2019-08-09 09:59:53
103.55.91.51 attackbots
Fail2Ban Ban Triggered
2019-08-09 09:53:21
196.46.36.144 attackbots
2019-07-31T02:52:07.732487wiz-ks3 sshd[6677]: Invalid user react from 196.46.36.144 port 34946
2019-07-31T02:52:07.734472wiz-ks3 sshd[6677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.36.144
2019-07-31T02:52:07.732487wiz-ks3 sshd[6677]: Invalid user react from 196.46.36.144 port 34946
2019-07-31T02:52:09.852360wiz-ks3 sshd[6677]: Failed password for invalid user react from 196.46.36.144 port 34946 ssh2
2019-07-31T03:06:35.553859wiz-ks3 sshd[6737]: Invalid user ozrt from 196.46.36.144 port 33137
2019-07-31T03:06:35.555967wiz-ks3 sshd[6737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.36.144
2019-07-31T03:06:35.553859wiz-ks3 sshd[6737]: Invalid user ozrt from 196.46.36.144 port 33137
2019-07-31T03:06:37.502978wiz-ks3 sshd[6737]: Failed password for invalid user ozrt from 196.46.36.144 port 33137 ssh2
2019-07-31T03:20:58.952843wiz-ks3 sshd[6765]: Invalid user paula from 196.46.36.144 port 59547
2019-07-31T03:20
2019-08-09 09:54:44
177.73.105.98 attack
failed_logins
2019-08-09 10:08:25
94.29.124.138 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:38:13,986 INFO [amun_request_handler] PortScan Detected on Port: 445 (94.29.124.138)
2019-08-09 09:43:39
66.214.40.126 attack
SSH-bruteforce attempts
2019-08-09 10:12:15
81.215.62.170 attackspambots
scan z
2019-08-09 09:50:55
109.163.193.66 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:31:22,695 INFO [amun_request_handler] PortScan Detected on Port: 445 (109.163.193.66)
2019-08-09 10:03:08
88.248.184.83 attackbotsspam
firewall-block, port(s): 23/tcp
2019-08-09 09:27:11
177.74.79.142 attackbotsspam
Aug  9 02:07:23 h2177944 sshd\[27136\]: Failed password for root from 177.74.79.142 port 36820 ssh2
Aug  9 03:07:42 h2177944 sshd\[29632\]: Invalid user student from 177.74.79.142 port 15517
Aug  9 03:07:42 h2177944 sshd\[29632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.74.79.142
Aug  9 03:07:43 h2177944 sshd\[29632\]: Failed password for invalid user student from 177.74.79.142 port 15517 ssh2
...
2019-08-09 09:30:06
87.239.85.169 attack
Aug  8 23:39:57 debian sshd\[2666\]: Invalid user salar from 87.239.85.169 port 45672
Aug  8 23:39:57 debian sshd\[2666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.239.85.169
...
2019-08-09 10:11:49
223.111.139.211 attackspambots
fire
2019-08-09 09:34:03
181.226.36.66 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:30:48,775 INFO [amun_request_handler] PortScan Detected on Port: 445 (181.226.36.66)
2019-08-09 10:04:28

Recently Reported IPs

94.22.52.227 187.42.158.124 197.141.178.163 159.48.197.137
150.131.31.207 43.102.69.183 107.182.134.122 23.149.222.139
85.147.174.195 167.252.138.185 47.167.185.237 29.178.183.163
99.132.19.59 167.174.4.200 96.140.57.76 231.149.29.211
88.248.43.211 81.89.166.120 172.131.103.95 180.41.178.104