Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.243.42.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25680
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.243.42.122.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031603 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 17 05:20:49 CST 2022
;; MSG SIZE  rcvd: 107
Host info
122.42.243.104.in-addr.arpa domain name pointer web1.advancedmodernsolutions.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.42.243.104.in-addr.arpa	name = web1.advancedmodernsolutions.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
43.230.29.79 attack
Sep 20 12:23:23 vpn01 sshd[19610]: Failed password for root from 43.230.29.79 port 49384 ssh2
...
2020-09-20 19:19:45
5.135.224.152 attackspam
Sep 20 11:36:33 * sshd[9112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.224.152
Sep 20 11:36:34 * sshd[9112]: Failed password for invalid user alex from 5.135.224.152 port 59480 ssh2
2020-09-20 19:02:41
49.234.96.210 attackspambots
Sep 20 12:32:55 inter-technics sshd[9070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210  user=root
Sep 20 12:32:57 inter-technics sshd[9070]: Failed password for root from 49.234.96.210 port 45518 ssh2
Sep 20 12:37:24 inter-technics sshd[9368]: Invalid user admin from 49.234.96.210 port 36962
Sep 20 12:37:24 inter-technics sshd[9368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210
Sep 20 12:37:24 inter-technics sshd[9368]: Invalid user admin from 49.234.96.210 port 36962
Sep 20 12:37:26 inter-technics sshd[9368]: Failed password for invalid user admin from 49.234.96.210 port 36962 ssh2
...
2020-09-20 18:56:50
161.35.88.139 attackspambots
Time:     Sun Sep 20 11:18:31 2020 +0000
IP:       161.35.88.139 (NL/Netherlands/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 20 11:06:06 47-1 sshd[28802]: Invalid user testftp from 161.35.88.139 port 56700
Sep 20 11:06:08 47-1 sshd[28802]: Failed password for invalid user testftp from 161.35.88.139 port 56700 ssh2
Sep 20 11:15:58 47-1 sshd[29394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.88.139  user=root
Sep 20 11:16:00 47-1 sshd[29394]: Failed password for root from 161.35.88.139 port 43344 ssh2
Sep 20 11:18:30 47-1 sshd[29474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.88.139  user=root
2020-09-20 19:29:31
34.244.98.129 attackbots
Port Scan: TCP/80
2020-09-20 19:04:20
106.53.220.103 attackspambots
Invalid user admin from 106.53.220.103 port 53230
2020-09-20 19:12:35
192.81.63.110 attackbots
Sep 19 18:58:20 nuernberg-4g-01 sshd[20925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.63.110 
Sep 19 18:58:22 nuernberg-4g-01 sshd[20925]: Failed password for invalid user admin from 192.81.63.110 port 40858 ssh2
Sep 19 18:58:26 nuernberg-4g-01 sshd[20948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.63.110
2020-09-20 19:07:16
69.163.194.151 attack
[SatSep1918:58:20.9168192020][:error][pid2756:tid47838991030016][client69.163.194.151:48072][client69.163.194.151]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(wp-\)\?config\\\\\\\\.\(php\)\?\\\\\\\\.\(\?:bac\?k\|o\(\?:ld\|rig\)\|copy\|tmp\|s\(\?:ave\|wp\)\|vim\?\\\\\\\\.\|~\)"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/10_asl_rules.conf"][line"1254"][id"390597"][rev"2"][msg"Atomicorp.comWAFRules:AttackBlocked-DataLeakage-attempttoaccessbackupsystem/applicationconfigfile\(disablethisruleonlyifyouwanttoallowanyoneaccesstothesebackupfiles\)"][severity"CRITICAL"][hostname"lacasadeitesori.com"][uri"/wp-config.php.bak"][unique_id"X2Y4rOnpg3w7ehOys6ZhKAAAAAc"][SatSep1918:58:27.8303522020][:error][pid3072:tid47838986827520][client69.163.194.151:48190][client69.163.194.151]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(wp-\)\?config\\\\\\\\.\(php\)\?\\\\\\\\.\(\?:bac\?k\|o\(\?:ld\|rig\)\|copy\|tmp\|s\(\?:ave\|wp\)\|vim\?\\\\\\\\.\|~\)"atREQUEST_FILENAME
2020-09-20 19:04:02
136.49.109.217 attackspam
2020-09-20T12:44:47.359575ns386461 sshd\[30332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.49.109.217  user=root
2020-09-20T12:44:49.316238ns386461 sshd\[30332\]: Failed password for root from 136.49.109.217 port 52748 ssh2
2020-09-20T12:51:51.606760ns386461 sshd\[4636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.49.109.217  user=root
2020-09-20T12:51:53.438533ns386461 sshd\[4636\]: Failed password for root from 136.49.109.217 port 42806 ssh2
2020-09-20T12:54:09.031206ns386461 sshd\[6640\]: Invalid user testing from 136.49.109.217 port 55328
...
2020-09-20 18:59:31
46.121.94.85 attackspam
Found on   Alienvault    / proto=6  .  srcport=7021  .  dstport=5555  .     (2276)
2020-09-20 19:06:46
222.186.175.151 attackspambots
2020-09-20T11:05:21.078826vps1033 sshd[26706]: Failed password for root from 222.186.175.151 port 34778 ssh2
2020-09-20T11:05:24.491178vps1033 sshd[26706]: Failed password for root from 222.186.175.151 port 34778 ssh2
2020-09-20T11:05:27.644298vps1033 sshd[26706]: Failed password for root from 222.186.175.151 port 34778 ssh2
2020-09-20T11:05:30.876257vps1033 sshd[26706]: Failed password for root from 222.186.175.151 port 34778 ssh2
2020-09-20T11:05:33.998392vps1033 sshd[26706]: Failed password for root from 222.186.175.151 port 34778 ssh2
...
2020-09-20 19:05:44
66.37.110.238 attack
Sep 20 12:18:44 minden010 sshd[23102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.37.110.238
Sep 20 12:18:46 minden010 sshd[23102]: Failed password for invalid user ftp_test from 66.37.110.238 port 42758 ssh2
Sep 20 12:23:15 minden010 sshd[24585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.37.110.238
...
2020-09-20 19:21:09
80.82.64.99 attackbots
Fail2Ban - SMTP Bruteforce Attempt
2020-09-20 19:30:07
94.254.12.164 attack
 TCP (SYN) 94.254.12.164:47231 -> port 22, len 60
2020-09-20 19:15:30
209.17.96.130 attackspambots
port scan and connect, tcp 81 (hosts2-ns)
2020-09-20 19:10:22

Recently Reported IPs

104.243.41.143 104.243.45.236 104.244.120.112 104.244.120.182
243.242.145.78 104.244.120.219 104.244.120.37 104.244.120.49
104.244.121.192 104.244.121.40 104.244.124.91 104.244.125.62
104.244.125.73 104.244.126.174 104.244.126.92 104.244.127.149
104.244.127.199 104.244.127.67 104.244.127.78 104.244.127.8