Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.26.14.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.26.14.242.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 04:06:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 242.14.26.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.14.26.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.188.84.95 attackspam
1,55-01/03 [bc01/m10] PostRequest-Spammer scoring: Dodoma
2020-09-12 14:01:21
5.62.49.108 attack
SQL injection:/index.php?menu_selected=http://toptronicinterfone.com.br/r57.txt?
2020-09-12 14:01:37
140.86.12.202 attack
140.86.12.202 - - [03/Jul/2020:20:44:42 +0000] "\x16\x03\x01\x00\x89\x01\x00\x00\x85\x03\x03~?\xCAGQ\x80\x17\x8B\xE2W;\x9B6\xA4" 400 166 "-" "-"
2020-09-12 14:04:51
83.209.189.42 attackspam
Lines containing failures of 83.209.189.42
Sep 10 21:12:26 mx-in-02 sshd[22862]: Invalid user pi from 83.209.189.42 port 45313
Sep 10 21:12:26 mx-in-02 sshd[22862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.209.189.42 
Sep 10 21:12:26 mx-in-02 sshd[22864]: Invalid user pi from 83.209.189.42 port 45314
Sep 10 21:12:26 mx-in-02 sshd[22864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.209.189.42 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=83.209.189.42
2020-09-12 13:51:21
51.254.120.159 attackbotsspam
Sep 12 07:29:18 root sshd[16848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.120.159 
...
2020-09-12 13:37:25
91.232.4.149 attackspambots
Sep 12 01:58:57 h1745522 sshd[16577]: Invalid user teresa from 91.232.4.149 port 58428
Sep 12 01:58:57 h1745522 sshd[16577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.232.4.149
Sep 12 01:58:57 h1745522 sshd[16577]: Invalid user teresa from 91.232.4.149 port 58428
Sep 12 01:58:59 h1745522 sshd[16577]: Failed password for invalid user teresa from 91.232.4.149 port 58428 ssh2
Sep 12 02:00:31 h1745522 sshd[18605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.232.4.149  user=root
Sep 12 02:00:33 h1745522 sshd[18605]: Failed password for root from 91.232.4.149 port 52142 ssh2
Sep 12 02:01:24 h1745522 sshd[18772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.232.4.149  user=root
Sep 12 02:01:26 h1745522 sshd[18772]: Failed password for root from 91.232.4.149 port 38356 ssh2
Sep 12 02:02:18 h1745522 sshd[18894]: Invalid user test from 91.232.4.149 port 52
...
2020-09-12 13:34:03
222.186.180.6 attack
Sep 12 07:36:35 nextcloud sshd\[13464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Sep 12 07:36:37 nextcloud sshd\[13464\]: Failed password for root from 222.186.180.6 port 27940 ssh2
Sep 12 07:36:41 nextcloud sshd\[13464\]: Failed password for root from 222.186.180.6 port 27940 ssh2
2020-09-12 13:47:46
185.234.216.64 attackbots
Sep 12 04:49:12 baraca dovecot: auth-worker(41476): passwd(test1,185.234.216.64): unknown user
Sep 12 05:30:53 baraca dovecot: auth-worker(43659): passwd(info,185.234.216.64): unknown user
Sep 12 06:12:34 baraca dovecot: auth-worker(46970): passwd(test,185.234.216.64): unknown user
Sep 12 06:54:27 baraca dovecot: auth-worker(49078): passwd(postmaster,185.234.216.64): Password mismatch
Sep 12 07:37:20 baraca dovecot: auth-worker(52501): passwd(test1,185.234.216.64): unknown user
Sep 12 08:19:50 baraca dovecot: auth-worker(54776): passwd(info,185.234.216.64): unknown user
...
2020-09-12 13:39:43
191.8.187.245 attackbots
Brute-force attempt banned
2020-09-12 13:31:05
218.92.0.212 attackspam
Sep 12 07:49:07 nextcloud sshd\[25149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Sep 12 07:49:09 nextcloud sshd\[25149\]: Failed password for root from 218.92.0.212 port 6849 ssh2
Sep 12 07:49:21 nextcloud sshd\[25149\]: Failed password for root from 218.92.0.212 port 6849 ssh2
2020-09-12 14:07:25
200.236.123.138 attack
Automatic report - Port Scan Attack
2020-09-12 13:50:29
139.198.122.19 attackspam
Sep 12 03:57:06 localhost sshd\[21748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.19  user=root
Sep 12 03:57:08 localhost sshd\[21748\]: Failed password for root from 139.198.122.19 port 45966 ssh2
Sep 12 04:08:26 localhost sshd\[21910\]: Invalid user admin from 139.198.122.19 port 43592
...
2020-09-12 13:56:51
222.186.175.154 attackbots
Sep 11 19:46:49 kapalua sshd\[24623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Sep 11 19:46:52 kapalua sshd\[24623\]: Failed password for root from 222.186.175.154 port 16500 ssh2
Sep 11 19:47:02 kapalua sshd\[24623\]: Failed password for root from 222.186.175.154 port 16500 ssh2
Sep 11 19:47:05 kapalua sshd\[24623\]: Failed password for root from 222.186.175.154 port 16500 ssh2
Sep 11 19:47:08 kapalua sshd\[24669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
2020-09-12 13:57:20
27.54.54.130 attackspam
20/9/11@12:56:45: FAIL: Alarm-Intrusion address from=27.54.54.130
20/9/11@12:56:46: FAIL: Alarm-Intrusion address from=27.54.54.130
...
2020-09-12 14:10:11
116.74.76.140 attackbots
Port Scan detected!
...
2020-09-12 13:55:43

Recently Reported IPs

104.26.14.243 104.26.14.247 104.26.14.246 104.26.14.245
104.26.14.249 104.26.14.248 104.26.14.251 104.26.14.25
2001:2d8:6f28:53d3:1bc5:bfa1:1e23:4ebb 104.26.14.28 104.26.14.29 104.26.14.27
104.26.14.3 104.26.14.32 104.26.14.33 104.26.14.26
104.26.14.30 104.26.14.34 104.26.14.35 104.26.14.36