Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.227.68.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.227.68.138.			IN	A

;; AUTHORITY SECTION:
.			291	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:15:29 CST 2022
;; MSG SIZE  rcvd: 107
Host info
138.68.227.104.in-addr.arpa domain name pointer peirce.helpingpersonal.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.68.227.104.in-addr.arpa	name = peirce.helpingpersonal.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.37.20.53 attackspambots
Unauthorized connection attempt from IP address 114.37.20.53 on Port 445(SMB)
2019-08-30 19:59:04
107.180.122.62 attackspambots
Tamper 535 requests by script code injection
2019-08-30 20:25:43
196.188.241.111 attack
Unauthorized connection attempt from IP address 196.188.241.111 on Port 445(SMB)
2019-08-30 20:02:52
5.54.45.59 attack
Telnet Server BruteForce Attack
2019-08-30 20:45:49
42.178.89.24 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-30 19:58:22
202.134.165.15 attackspambots
Unauthorized connection attempt from IP address 202.134.165.15 on Port 445(SMB)
2019-08-30 20:30:22
125.161.106.228 attackspambots
Unauthorized connection attempt from IP address 125.161.106.228 on Port 445(SMB)
2019-08-30 20:18:12
36.112.128.99 attackbots
Aug 30 09:30:20 XXX sshd[54384]: Invalid user hadoop from 36.112.128.99 port 51411
2019-08-30 20:35:04
92.220.29.21 attackbots
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-08-30 20:24:11
61.19.242.233 attack
SMB Server BruteForce Attack
2019-08-30 19:55:05
41.190.92.194 attackspambots
Invalid user psiege from 41.190.92.194 port 35976
2019-08-30 20:11:21
103.87.104.179 attack
Unauthorized connection attempt from IP address 103.87.104.179 on Port 445(SMB)
2019-08-30 20:40:35
51.15.1.221 attackbots
Aug 30 00:26:57 friendsofhawaii sshd\[19345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fight-for-privacy.fsociety.ltd  user=root
Aug 30 00:26:58 friendsofhawaii sshd\[19345\]: Failed password for root from 51.15.1.221 port 34448 ssh2
Aug 30 00:27:01 friendsofhawaii sshd\[19345\]: Failed password for root from 51.15.1.221 port 34448 ssh2
Aug 30 00:27:03 friendsofhawaii sshd\[19345\]: Failed password for root from 51.15.1.221 port 34448 ssh2
Aug 30 00:27:06 friendsofhawaii sshd\[19345\]: Failed password for root from 51.15.1.221 port 34448 ssh2
2019-08-30 20:33:06
104.199.198.7 attack
Invalid user ubuntu from 104.199.198.7 port 41784
2019-08-30 20:05:42
178.128.21.38 attackspam
Aug 30 14:04:22 localhost sshd\[28604\]: Invalid user curelea from 178.128.21.38 port 55374
Aug 30 14:04:22 localhost sshd\[28604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.38
Aug 30 14:04:24 localhost sshd\[28604\]: Failed password for invalid user curelea from 178.128.21.38 port 55374 ssh2
2019-08-30 20:10:54

Recently Reported IPs

101.109.45.9 104.227.68.90 104.227.69.159 104.227.69.117
104.227.69.195 104.227.69.166 104.227.65.22 104.227.68.172
104.227.69.142 104.227.69.2 104.227.69.220 104.227.69.48
104.227.69.225 104.227.69.235 101.109.45.94 104.227.69.213
104.227.69.215 104.227.66.243 104.227.69.232 104.227.69.55