Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.227.196.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.227.196.142.		IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 20:56:55 CST 2022
;; MSG SIZE  rcvd: 108
Host info
142.196.227.104.in-addr.arpa domain name pointer forums.ntextlevlop.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.196.227.104.in-addr.arpa	name = forums.ntextlevlop.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.225.157.113 attackspam
SSH Scan
2019-10-22 02:45:02
198.54.114.112 attack
xmlrpc attack
2019-10-22 02:44:07
203.230.6.175 attackspambots
Oct 19 13:41:54 mail sshd[13440]: Failed password for root from 203.230.6.175 port 41536 ssh2
Oct 19 13:46:21 mail sshd[15130]: Failed password for root from 203.230.6.175 port 53138 ssh2
2019-10-22 03:16:34
95.70.224.90 attackspam
Automatic report - Port Scan Attack
2019-10-22 02:48:06
24.221.113.165 attackbotsspam
SSH Scan
2019-10-22 02:56:48
212.51.156.48 attackspambots
SSH Scan
2019-10-22 02:38:53
115.159.143.217 attack
Oct 21 18:08:01 server sshd\[20848\]: Invalid user revisor from 115.159.143.217
Oct 21 18:08:01 server sshd\[20848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.143.217 
Oct 21 18:08:03 server sshd\[20848\]: Failed password for invalid user revisor from 115.159.143.217 port 48900 ssh2
Oct 21 18:09:56 server sshd\[21112\]: Invalid user revisor from 115.159.143.217
Oct 21 18:09:56 server sshd\[21112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.143.217 
...
2019-10-22 03:08:54
49.81.95.3 attackbotsspam
$f2bV_matches
2019-10-22 03:04:09
41.87.80.26 attackspambots
Oct 21 04:58:09 mail sshd[25027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.87.80.26 
Oct 21 04:58:11 mail sshd[25027]: Failed password for invalid user neww from 41.87.80.26 port 33113 ssh2
Oct 21 05:07:46 mail sshd[29272]: Failed password for root from 41.87.80.26 port 10524 ssh2
2019-10-22 02:35:38
139.199.159.77 attackspam
Automatic report - Banned IP Access
2019-10-22 02:57:07
157.245.98.160 attackspam
2019-10-22T00:21:57.474740enmeeting.mahidol.ac.th sshd\[28826\]: User root from 157.245.98.160 not allowed because not listed in AllowUsers
2019-10-22T00:21:57.598602enmeeting.mahidol.ac.th sshd\[28826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.98.160  user=root
2019-10-22T00:21:59.910382enmeeting.mahidol.ac.th sshd\[28826\]: Failed password for invalid user root from 157.245.98.160 port 48112 ssh2
...
2019-10-22 02:39:26
155.186.168.193 attackbots
SSH Scan
2019-10-22 03:02:35
84.180.253.180 attackbots
SSH Scan
2019-10-22 02:53:52
106.13.99.245 attackspambots
2019-10-21T14:56:26.530371abusebot-5.cloudsearch.cf sshd\[5888\]: Invalid user desmond from 106.13.99.245 port 59524
2019-10-22 02:41:24
59.152.237.118 attackspam
SSH brutforce
2019-10-22 02:59:04

Recently Reported IPs

170.254.201.96 149.18.56.15 168.195.139.248 173.230.131.188
128.90.197.229 128.90.196.239 128.90.205.68 128.90.202.128
128.90.196.170 128.90.175.99 128.90.205.205 124.222.222.178
124.71.233.102 178.208.160.115 104.165.169.210 128.90.202.242
23.230.42.79 176.59.122.39 171.211.92.49 128.90.181.177