Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: Cloud9

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.238.167.125 attack
SP-Scan 1001:45568 detected 2020.09.01 05:24:44
blocked until 2020.10.20 22:27:31
2020-09-02 23:56:38
104.238.167.125 attack
SP-Scan 1001:45568 detected 2020.09.01 05:24:44
blocked until 2020.10.20 22:27:31
2020-09-02 15:28:36
104.238.167.125 attackbotsspam
SP-Scan 1001:45568 detected 2020.09.01 05:24:44
blocked until 2020.10.20 22:27:31
2020-09-02 08:33:08
104.238.161.106 attack
Unauthorized connection attempt detected from IP address 104.238.161.106 to port 3389 [T]
2020-08-29 22:27:37
104.238.161.106 attackspambots
Unauthorized connection attempt detected from IP address 104.238.161.106 to port 3389 [T]
2020-08-14 04:42:02
104.238.161.106 attack
Unauthorized connection attempt detected from IP address 104.238.161.106 to port 3389 [T]
2020-05-20 13:43:40
104.238.160.247 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5414cc026b2edcca | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: JP | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: api.skk.moe | User-Agent: Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14 | CF_DC: SIN. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 00:44:18
104.238.162.110 attackbotsspam
RDP Bruteforce
2019-11-28 04:11:54
104.238.162.110 attack
RDP Bruteforce
2019-10-31 03:06:59
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.238.16.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.238.16.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 05 19:41:37 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 52.16.238.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.16.238.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.211.87.16 attackspam
Invalid user xls from 222.211.87.16 port 2624
2020-05-23 15:53:46
1.2.138.164 attackspambots
Invalid user admin from 1.2.138.164 port 54440
2020-05-23 15:52:33
190.5.242.114 attack
Invalid user ljn from 190.5.242.114 port 33926
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.242.114
Failed password for invalid user ljn from 190.5.242.114 port 33926 ssh2
Invalid user hourunping from 190.5.242.114 port 51255
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.242.114
2020-05-23 16:16:35
201.48.192.60 attackspam
"fail2ban match"
2020-05-23 16:04:28
185.175.93.17 attackspam
05/23/2020-03:33:01.864262 185.175.93.17 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-23 16:20:18
198.108.67.45 attackbots
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 16:06:39
190.61.33.99 attackspam
Invalid user service from 190.61.33.99 port 13411
2020-05-23 16:16:18
213.244.123.182 attackbots
k+ssh-bruteforce
2020-05-23 16:00:21
221.122.119.50 attack
SSH Brute-Force reported by Fail2Ban
2020-05-23 15:54:53
184.22.202.74 attackspam
Invalid user r00t from 184.22.202.74 port 53403
2020-05-23 16:24:11
195.54.167.120 attackbots
Port scan on 3 port(s): 4203 4208 4212
2020-05-23 16:08:09
220.132.182.203 attackbotsspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 15:57:17
220.137.44.237 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 15:55:55
46.140.151.66 attackspambots
May 23 00:02:42 lanister sshd[14916]: Invalid user cgu from 46.140.151.66
2020-05-23 15:42:55
42.118.10.7 attackspambots
Invalid user pi from 42.118.10.7 port 52979
2020-05-23 15:43:33

Recently Reported IPs

127.76.14.132 30.151.246.2 20.239.53.45 63.103.163.225
16.220.155.254 89.1.245.243 234.129.224.147 182.131.26.102
135.63.26.192 56.6.15.126 218.232.57.225 80.85.231.51
250.133.208.84 18.92.164.237 128.111.170.60 132.98.90.16
82.183.128.32 223.184.109.60 115.251.221.21 38.218.169.87