Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.243.80.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.243.80.8.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 12:38:24 CST 2022
;; MSG SIZE  rcvd: 105
Host info
8.80.243.104.in-addr.arpa domain name pointer ip-104-243-80-8.user.start.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.80.243.104.in-addr.arpa	name = ip-104-243-80-8.user.start.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
151.48.166.241 attackbots
Automatic report - Port Scan Attack
2020-04-11 22:00:24
185.86.6.245 attackbots
Shopping spam
2020-04-11 21:48:24
24.55.29.143 attack
Apr 11 07:40:05 server1 sshd\[27906\]: Invalid user www from 24.55.29.143
Apr 11 07:40:05 server1 sshd\[27906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.55.29.143 
Apr 11 07:40:07 server1 sshd\[27906\]: Failed password for invalid user www from 24.55.29.143 port 46648 ssh2
Apr 11 07:45:43 server1 sshd\[29475\]: Invalid user elvis from 24.55.29.143
Apr 11 07:45:43 server1 sshd\[29475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.55.29.143 
...
2020-04-11 22:20:47
120.92.2.217 attack
Apr 11 16:45:47 lukav-desktop sshd\[19563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.2.217  user=root
Apr 11 16:45:49 lukav-desktop sshd\[19563\]: Failed password for root from 120.92.2.217 port 30888 ssh2
Apr 11 16:50:19 lukav-desktop sshd\[19721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.2.217  user=root
Apr 11 16:50:21 lukav-desktop sshd\[19721\]: Failed password for root from 120.92.2.217 port 6828 ssh2
Apr 11 16:52:15 lukav-desktop sshd\[19788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.2.217  user=root
2020-04-11 22:04:28
219.233.49.201 attackbotsspam
DATE:2020-04-11 14:19:27, IP:219.233.49.201, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-04-11 22:00:45
118.101.192.81 attackbots
$f2bV_matches
2020-04-11 21:34:58
117.50.63.228 attackspam
Apr 11 16:25:30 ift sshd\[35461\]: Invalid user rails from 117.50.63.228Apr 11 16:25:32 ift sshd\[35461\]: Failed password for invalid user rails from 117.50.63.228 port 55202 ssh2Apr 11 16:29:54 ift sshd\[35722\]: Failed password for root from 117.50.63.228 port 49214 ssh2Apr 11 16:33:54 ift sshd\[36141\]: Invalid user kopet from 117.50.63.228Apr 11 16:33:56 ift sshd\[36141\]: Failed password for invalid user kopet from 117.50.63.228 port 43212 ssh2
...
2020-04-11 21:53:03
193.39.168.18 attack
Sending tons of crap spam using different IP addresses in this range.
2020-04-11 22:14:29
59.120.147.94 attack
04/11/2020-08:19:59.024374 59.120.147.94 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-11 21:36:52
36.82.101.180 attack
1586607589 - 04/11/2020 14:19:49 Host: 36.82.101.180/36.82.101.180 Port: 445 TCP Blocked
2020-04-11 21:47:53
34.246.37.66 attackbotsspam
Apr 11 02:11:27 web9 sshd\[8924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.246.37.66  user=root
Apr 11 02:11:29 web9 sshd\[8924\]: Failed password for root from 34.246.37.66 port 40292 ssh2
Apr 11 02:15:30 web9 sshd\[9514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.246.37.66  user=root
Apr 11 02:15:33 web9 sshd\[9514\]: Failed password for root from 34.246.37.66 port 51008 ssh2
Apr 11 02:19:38 web9 sshd\[10150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.246.37.66  user=root
2020-04-11 21:54:18
110.8.67.146 attack
Apr 11 15:33:19 plex sshd[8473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.8.67.146  user=root
Apr 11 15:33:22 plex sshd[8473]: Failed password for root from 110.8.67.146 port 40146 ssh2
2020-04-11 21:46:46
218.92.0.178 attackspambots
Apr 11 18:54:39 gw1 sshd[24215]: Failed password for root from 218.92.0.178 port 5870 ssh2
Apr 11 18:54:43 gw1 sshd[24215]: Failed password for root from 218.92.0.178 port 5870 ssh2
...
2020-04-11 22:18:09
111.198.88.86 attackspam
2020-04-11T14:12:56.211184centos sshd[17649]: Failed password for invalid user doncell from 111.198.88.86 port 37766 ssh2
2020-04-11T14:19:19.356482centos sshd[18059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.88.86  user=root
2020-04-11T14:19:21.785605centos sshd[18059]: Failed password for root from 111.198.88.86 port 60360 ssh2
...
2020-04-11 22:05:51
188.162.43.108 attackbots
Email SASL login failure
2020-04-11 22:28:32

Recently Reported IPs

104.243.80.42 104.244.102.160 104.244.102.161 104.244.102.162
104.244.102.163 104.244.102.164 104.244.102.165 104.244.102.166
104.244.102.167 104.244.102.168 104.244.102.169 138.67.62.22
104.244.102.170 104.244.102.171 104.244.102.173 104.244.102.174
104.244.102.175 104.244.102.176 104.244.102.177 104.244.102.178