Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.27.29.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.27.29.114.			IN	A

;; AUTHORITY SECTION:
.			517	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:50:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 114.29.27.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.29.27.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.154 attack
Dec  1 10:12:28 MK-Soft-VM4 sshd[25378]: Failed password for root from 222.186.173.154 port 6618 ssh2
Dec  1 10:12:34 MK-Soft-VM4 sshd[25378]: Failed password for root from 222.186.173.154 port 6618 ssh2
Dec  1 10:12:43 MK-Soft-VM4 sshd[25378]: Failed password for root from 222.186.173.154 port 6618 ssh2
Dec  1 10:12:52 MK-Soft-VM4 sshd[25378]: Failed password for root from 222.186.173.154 port 6618 ssh2
...
2019-12-01 17:18:39
218.92.0.134 attackspambots
[ssh] SSH attack
2019-12-01 17:00:32
109.194.175.27 attackspam
Nov 30 20:24:03 php1 sshd\[32474\]: Invalid user pswd from 109.194.175.27
Nov 30 20:24:03 php1 sshd\[32474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.175.27
Nov 30 20:24:04 php1 sshd\[32474\]: Failed password for invalid user pswd from 109.194.175.27 port 60934 ssh2
Nov 30 20:27:52 php1 sshd\[712\]: Invalid user guolei1983 from 109.194.175.27
Nov 30 20:27:52 php1 sshd\[712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.175.27
2019-12-01 17:06:44
193.188.22.193 attackspam
UTC: 2019-11-30 port: 1022/tcp
2019-12-01 17:12:18
62.234.124.102 attack
Dec  1 09:04:19 server sshd\[18695\]: Invalid user tuvia from 62.234.124.102
Dec  1 09:04:19 server sshd\[18695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.124.102 
Dec  1 09:04:21 server sshd\[18695\]: Failed password for invalid user tuvia from 62.234.124.102 port 33444 ssh2
Dec  1 09:28:12 server sshd\[24716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.124.102  user=root
Dec  1 09:28:14 server sshd\[24716\]: Failed password for root from 62.234.124.102 port 45036 ssh2
...
2019-12-01 16:51:17
139.59.17.193 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-12-01 16:56:28
122.51.86.55 attackspambots
Dec  1 10:02:24 localhost sshd[5552]: Failed password for invalid user baki from 122.51.86.55 port 58226 ssh2
Dec  1 10:13:03 localhost sshd[6069]: Failed password for invalid user smakom from 122.51.86.55 port 45348 ssh2
Dec  1 10:17:39 localhost sshd[6211]: Failed password for invalid user wwwrun from 122.51.86.55 port 51026 ssh2
2019-12-01 17:25:09
163.172.84.50 attackbotsspam
Dec  1 09:30:27 meumeu sshd[32718]: Failed password for root from 163.172.84.50 port 43705 ssh2
Dec  1 09:33:39 meumeu sshd[647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.84.50 
Dec  1 09:33:41 meumeu sshd[647]: Failed password for invalid user debes from 163.172.84.50 port 32909 ssh2
...
2019-12-01 17:05:17
180.101.221.152 attackspambots
Dec  1 08:00:14 ns382633 sshd\[7153\]: Invalid user sekhar from 180.101.221.152 port 57538
Dec  1 08:00:14 ns382633 sshd\[7153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.221.152
Dec  1 08:00:16 ns382633 sshd\[7153\]: Failed password for invalid user sekhar from 180.101.221.152 port 57538 ssh2
Dec  1 08:24:16 ns382633 sshd\[11585\]: Invalid user admin from 180.101.221.152 port 55650
Dec  1 08:24:16 ns382633 sshd\[11585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.221.152
2019-12-01 17:21:01
187.162.135.44 attack
Automatic report - Port Scan Attack
2019-12-01 17:24:42
218.92.0.158 attackbots
Dec  1 03:33:22 xentho sshd[32148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Dec  1 03:33:23 xentho sshd[32148]: Failed password for root from 218.92.0.158 port 1227 ssh2
Dec  1 03:33:26 xentho sshd[32148]: Failed password for root from 218.92.0.158 port 1227 ssh2
Dec  1 03:33:22 xentho sshd[32148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Dec  1 03:33:23 xentho sshd[32148]: Failed password for root from 218.92.0.158 port 1227 ssh2
Dec  1 03:33:26 xentho sshd[32148]: Failed password for root from 218.92.0.158 port 1227 ssh2
Dec  1 03:33:22 xentho sshd[32148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Dec  1 03:33:23 xentho sshd[32148]: Failed password for root from 218.92.0.158 port 1227 ssh2
Dec  1 03:33:26 xentho sshd[32148]: Failed password for root from 218.92.0.158 port 12
...
2019-12-01 16:50:57
13.82.186.251 attackspambots
Dec  1 02:15:09 TORMINT sshd\[17672\]: Invalid user Qa123654789 from 13.82.186.251
Dec  1 02:15:09 TORMINT sshd\[17672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.186.251
Dec  1 02:15:11 TORMINT sshd\[17672\]: Failed password for invalid user Qa123654789 from 13.82.186.251 port 56226 ssh2
...
2019-12-01 16:57:46
170.82.73.235 attackspam
UTC: 2019-11-30 port: 23/tcp
2019-12-01 16:59:30
201.116.194.210 attack
Dec  1 01:49:41 lanister sshd[30057]: Invalid user freddy from 201.116.194.210
Dec  1 01:49:41 lanister sshd[30057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.194.210
Dec  1 01:49:41 lanister sshd[30057]: Invalid user freddy from 201.116.194.210
Dec  1 01:49:43 lanister sshd[30057]: Failed password for invalid user freddy from 201.116.194.210 port 22605 ssh2
...
2019-12-01 17:12:50
188.85.0.140 attack
Dec  1 07:28:18 vpn01 sshd[30043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.85.0.140
Dec  1 07:28:20 vpn01 sshd[30043]: Failed password for invalid user media from 188.85.0.140 port 58548 ssh2
...
2019-12-01 16:47:49

Recently Reported IPs

104.27.28.114 104.27.30.30 211.23.195.103 104.27.41.48
104.27.55.114 104.27.54.114 104.27.49.115 104.27.5.113
104.27.60.116 104.27.48.115 104.36.110.78 104.31.16.138
104.27.61.116 104.36.149.217 104.36.148.165 104.32.12.223
104.31.16.245 104.36.224.183 104.36.225.64 104.36.203.218