Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.26.2.116 normal
443
2025-03-28 16:46:33
104.26.2.27 attackspambots
SSH login attempts.
2020-06-19 19:32:02
104.26.2.46 attackbotsspam
Block🖕🖕🖕
2020-05-14 22:57:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.26.2.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26437
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.26.2.242.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 04:09:21 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 242.2.26.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.2.26.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
72.48.214.68 attack
'Fail2Ban'
2019-11-11 18:54:50
114.70.93.64 attack
Nov 11 08:00:55 sshgateway sshd\[5361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.70.93.64  user=root
Nov 11 08:00:57 sshgateway sshd\[5361\]: Failed password for root from 114.70.93.64 port 51702 ssh2
Nov 11 08:09:15 sshgateway sshd\[5392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.70.93.64  user=nobody
2019-11-11 18:51:59
175.207.13.200 attack
Nov 11 02:20:36 ny01 sshd[3305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200
Nov 11 02:20:38 ny01 sshd[3305]: Failed password for invalid user sieloff from 175.207.13.200 port 57222 ssh2
Nov 11 02:25:40 ny01 sshd[4237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200
2019-11-11 18:39:50
128.199.55.13 attackbots
ssh failed login
2019-11-11 18:51:06
153.35.93.7 attack
Nov 11 09:48:15 mail sshd[19254]: Failed password for root from 153.35.93.7 port 31395 ssh2
Nov 11 09:52:41 mail sshd[21856]: Failed password for backup from 153.35.93.7 port 62067 ssh2
Nov 11 09:56:53 mail sshd[23970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.35.93.7
2019-11-11 18:56:54
104.131.1.137 attackbotsspam
Nov 11 07:48:21 vserver sshd\[23729\]: Invalid user test from 104.131.1.137Nov 11 07:48:24 vserver sshd\[23729\]: Failed password for invalid user test from 104.131.1.137 port 35601 ssh2Nov 11 07:53:29 vserver sshd\[23749\]: Invalid user costel from 104.131.1.137Nov 11 07:53:31 vserver sshd\[23749\]: Failed password for invalid user costel from 104.131.1.137 port 54320 ssh2
...
2019-11-11 18:58:09
125.124.70.22 attackspam
Nov 11 09:02:42 SilenceServices sshd[15463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.70.22
Nov 11 09:02:44 SilenceServices sshd[15463]: Failed password for invalid user apache from 125.124.70.22 port 51336 ssh2
Nov 11 09:07:26 SilenceServices sshd[16873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.70.22
2019-11-11 19:10:13
107.189.11.11 attackspam
Nov 11 03:04:13 ns342841 sshd[16325]: Invalid user fake from 107.189.11.11
Nov 11 03:04:13 ns342841 sshd[16326]: Received disconnect from 107.189.11.11: 11: Bye Bye
Nov 11 03:04:13 ns342841 sshd[16327]: Invalid user admin from 107.189.11.11
Nov 11 03:04:13 ns342841 sshd[16328]: Received disconnect from 107.189.11.11: 11: Bye Bye
Nov 11 03:04:14 ns342841 sshd[16330]: Received disconnect from 107.189.11.11: 11: Bye Bye
Nov 11 03:04:14 ns342841 sshd[16331]: Invalid user ubnt from 107.189.11.11
Nov 11 03:04:14 ns342841 sshd[16332]: Received disconnect from 107.189.11.11: 11: Bye Bye
Nov 11 03:04:14 ns342841 sshd[16333]: Invalid user guest from 107.189.11.11
Nov 11 03:04:14 ns342841 sshd[16334]: Received disconnect from 107.189.11.11: 11: Bye Bye
Nov 11 03:04:15 ns342841 sshd[16335]: Invalid user support from 107.189.11.11
Nov 11 03:04:15 ns342841 sshd[16336]: Received disconnect from 107.189.11.11: 11: Bye Bye

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=107.1
2019-11-11 19:09:01
120.92.35.127 attackbotsspam
Nov 11 11:26:11 srv1 sshd[20323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.35.127
Nov 11 11:26:14 srv1 sshd[20323]: Failed password for invalid user cosentino from 120.92.35.127 port 33486 ssh2
...
2019-11-11 18:49:39
45.95.32.243 attackspambots
Lines containing failures of 45.95.32.243
Nov 11 07:12:26 shared04 postfix/smtpd[11024]: connect from sleeper.protutoriais.com[45.95.32.243]
Nov 11 07:12:26 shared04 policyd-spf[11027]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.95.32.243; helo=sleeper.byfridaem.co; envelope-from=x@x
Nov x@x
Nov 11 07:12:26 shared04 postfix/smtpd[11024]: disconnect from sleeper.protutoriais.com[45.95.32.243] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov 11 07:13:04 shared04 postfix/smtpd[9039]: connect from sleeper.protutoriais.com[45.95.32.243]
Nov 11 07:13:04 shared04 policyd-spf[13345]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.95.32.243; helo=sleeper.byfridaem.co; envelope-from=x@x
Nov x@x
Nov 11 07:13:04 shared04 postfix/smtpd[9039]: disconnect from sleeper.protutoriais.com[45.95.32.243] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov 11 07:14:06 shared04 postfix/smtpd[9913]: connect fro........
------------------------------
2019-11-11 18:37:30
51.255.42.250 attack
2019-11-11T08:07:39.294666abusebot-2.cloudsearch.cf sshd\[21634\]: Invalid user lorinda from 51.255.42.250 port 56791
2019-11-11 18:59:33
207.46.13.88 attack
Automatic report - Banned IP Access
2019-11-11 19:02:25
218.92.0.138 attackspambots
Nov 11 07:24:10 dedicated sshd[19871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Nov 11 07:24:12 dedicated sshd[19871]: Failed password for root from 218.92.0.138 port 39413 ssh2
2019-11-11 18:53:40
192.228.100.118 attackbots
2019-11-11T10:57:46.423848mail01 postfix/smtpd[11630]: warning: unknown[192.228.100.118]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T10:58:17.420400mail01 postfix/smtpd[23860]: warning: unknown[192.228.100.118]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T11:04:02.291906mail01 postfix/smtpd[23860]: warning: unknown[192.228.100.118]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11 18:40:52
185.83.146.171 attack
Nov 11 01:15:02 mxgate1 postfix/postscreen[15703]: CONNECT from [185.83.146.171]:35662 to [176.31.12.44]:25
Nov 11 01:15:02 mxgate1 postfix/dnsblog[15704]: addr 185.83.146.171 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 11 01:15:02 mxgate1 postfix/dnsblog[15705]: addr 185.83.146.171 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 11 01:15:02 mxgate1 postfix/dnsblog[15771]: addr 185.83.146.171 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 11 01:15:02 mxgate1 postfix/dnsblog[15707]: addr 185.83.146.171 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 11 01:15:03 mxgate1 postfix/dnsblog[15706]: addr 185.83.146.171 listed by domain bl.spamcop.net as 127.0.0.2
Nov 11 01:15:08 mxgate1 postfix/postscreen[15703]: DNSBL rank 6 for [185.83.146.171]:35662
Nov x@x
Nov 11 01:15:08 mxgate1 postfix/postscreen[15703]: HANGUP after 0.38 from [185.83.146.171]:35662 in tests after SMTP handshake
Nov 11 01:15:08 mxgate1 postfix/postscreen[15703]: DISCONNECT [185.83........
-------------------------------
2019-11-11 19:07:05

Recently Reported IPs

104.26.2.241 104.26.2.244 104.26.2.243 104.26.2.245
104.26.2.246 104.26.2.240 104.26.2.247 104.26.2.249
104.26.2.25 104.26.2.251 104.26.2.248 104.26.2.250
104.26.2.26 104.26.2.28 104.26.2.29 104.26.2.30
104.26.2.3 104.26.2.31 82.95.80.110 104.26.2.32