Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.240.72.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55842
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.240.72.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 10:43:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 80.72.240.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.72.240.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.216.161.223 attackspam
 TCP (SYN) 61.216.161.223:10321 -> port 23, len 44
2020-10-12 07:18:36
173.15.85.9 attack
Oct 11 19:23:28 firewall sshd[28201]: Invalid user ito from 173.15.85.9
Oct 11 19:23:30 firewall sshd[28201]: Failed password for invalid user ito from 173.15.85.9 port 45537 ssh2
Oct 11 19:27:54 firewall sshd[28375]: Invalid user ftp_user from 173.15.85.9
...
2020-10-12 07:20:32
184.105.247.244 attackbotsspam
firewall-block, port(s): 5900/tcp
2020-10-12 07:39:03
104.248.176.46 attack
Oct 12 00:57:33 inter-technics sshd[15470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.176.46  user=root
Oct 12 00:57:35 inter-technics sshd[15470]: Failed password for root from 104.248.176.46 port 60244 ssh2
Oct 12 01:01:28 inter-technics sshd[19237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.176.46  user=root
Oct 12 01:01:30 inter-technics sshd[19237]: Failed password for root from 104.248.176.46 port 36230 ssh2
Oct 12 01:05:17 inter-technics sshd[28934]: Invalid user yamaji from 104.248.176.46 port 40442
...
2020-10-12 07:10:10
104.248.246.41 attack
fail2ban detected brute force on sshd
2020-10-12 07:24:44
178.209.124.226 attackbots
Brute forcing RDP port 3389
2020-10-12 07:20:48
95.111.194.171 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-10-12 07:07:58
51.255.173.222 attack
(sshd) Failed SSH login from 51.255.173.222 (FR/France/222.ip-51-255-173.eu): 5 in the last 3600 secs
2020-10-12 07:19:35
104.148.61.175 attackbotsspam
Oct 10 22:45:59 SRV001 postfix/smtpd[15262]: NOQUEUE: reject: RCPT from unknown[104.148.61.175]: 554 5.7.1 : Relay access denied; from= to= proto=SMTP helo=
...
2020-10-12 07:22:51
194.165.99.231 attackbotsspam
Oct 12 00:57:31 inter-technics sshd[15468]: Invalid user test from 194.165.99.231 port 38106
Oct 12 00:57:31 inter-technics sshd[15468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.165.99.231
Oct 12 00:57:31 inter-technics sshd[15468]: Invalid user test from 194.165.99.231 port 38106
Oct 12 00:57:34 inter-technics sshd[15468]: Failed password for invalid user test from 194.165.99.231 port 38106 ssh2
Oct 12 01:00:36 inter-technics sshd[24593]: Invalid user silas from 194.165.99.231 port 39700
...
2020-10-12 07:36:48
163.172.154.178 attackbotsspam
2020-10-12T00:30:12+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-10-12 07:08:18
212.70.149.20 attackbotsspam
Oct 12 01:11:07 galaxy event: galaxy/lswi: smtp: cv@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Oct 12 01:11:31 galaxy event: galaxy/lswi: smtp: socks@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Oct 12 01:11:55 galaxy event: galaxy/lswi: smtp: schedule@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Oct 12 01:12:20 galaxy event: galaxy/lswi: smtp: vodafone@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Oct 12 01:12:44 galaxy event: galaxy/lswi: smtp: gamma@uni-potsdam.de [212.70.149.20] authentication failure using internet password
...
2020-10-12 07:15:19
106.13.80.167 attack
Oct 11 23:32:13 email sshd\[8095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.80.167  user=root
Oct 11 23:32:15 email sshd\[8095\]: Failed password for root from 106.13.80.167 port 37962 ssh2
Oct 11 23:36:15 email sshd\[8891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.80.167  user=root
Oct 11 23:36:16 email sshd\[8891\]: Failed password for root from 106.13.80.167 port 40086 ssh2
Oct 11 23:40:15 email sshd\[9682\]: Invalid user graham from 106.13.80.167
...
2020-10-12 07:41:06
222.186.42.213 attackspambots
2020-10-12T02:03:36.927089lavrinenko.info sshd[3389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
2020-10-12T02:03:39.004200lavrinenko.info sshd[3389]: Failed password for root from 222.186.42.213 port 13209 ssh2
2020-10-12T02:03:36.927089lavrinenko.info sshd[3389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
2020-10-12T02:03:39.004200lavrinenko.info sshd[3389]: Failed password for root from 222.186.42.213 port 13209 ssh2
2020-10-12T02:03:43.293689lavrinenko.info sshd[3389]: Failed password for root from 222.186.42.213 port 13209 ssh2
...
2020-10-12 07:06:44
3.249.157.117 attackbotsspam
Unauthorized connection attempt detected, IP banned.
2020-10-12 07:40:50

Recently Reported IPs

109.150.69.111 153.233.103.96 114.222.220.18 87.234.183.212
180.188.39.244 155.57.44.149 229.96.84.221 135.55.54.14
149.128.70.172 133.142.236.163 224.159.210.195 72.240.156.9
143.140.236.183 171.149.214.80 90.101.127.192 33.87.178.39
36.44.194.61 226.15.62.219 162.197.142.119 42.106.108.139