Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.34.25.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.34.25.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:20:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
142.25.34.104.in-addr.arpa domain name pointer syn-104-034-025-142.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.25.34.104.in-addr.arpa	name = syn-104-034-025-142.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.223 attack
Nov 14 07:36:56 lanister sshd[9525]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 10792 ssh2 [preauth]
Nov 14 07:36:56 lanister sshd[9525]: Disconnecting: Too many authentication failures [preauth]
Nov 14 07:37:01 lanister sshd[9528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Nov 14 07:37:03 lanister sshd[9528]: Failed password for root from 222.186.180.223 port 27004 ssh2
...
2019-11-14 20:53:14
51.89.151.214 attackbotsspam
$f2bV_matches
2019-11-14 21:03:55
182.114.17.151 attackspambots
UTC: 2019-11-13 port: 23/tcp
2019-11-14 20:33:11
45.136.110.24 attack
Fail2Ban Ban Triggered
2019-11-14 20:57:27
109.169.72.60 attackspambots
2019-11-14T09:49:48.076519mail01 postfix/smtpd[24171]: warning: unknown[109.169.72.60]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-14T09:53:46.021542mail01 postfix/smtpd[24171]: warning: unknown[109.169.72.60]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-14T09:56:56.438398mail01 postfix/smtpd[4028]: warning: unknown[109.169.72.60]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-14 20:32:15
178.68.154.100 attackspambots
Chat Spam
2019-11-14 20:51:17
51.77.195.149 attack
Nov 14 12:14:57 SilenceServices sshd[28761]: Failed password for uucp from 51.77.195.149 port 33046 ssh2
Nov 14 12:22:01 SilenceServices sshd[30905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.195.149
Nov 14 12:22:03 SilenceServices sshd[30905]: Failed password for invalid user chinh from 51.77.195.149 port 42016 ssh2
2019-11-14 20:54:37
74.82.47.3 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 20:56:57
138.255.204.13 attack
UTC: 2019-11-13 port: 23/tcp
2019-11-14 20:55:05
95.85.68.149 attackspam
Automatic report - Banned IP Access
2019-11-14 21:04:48
104.248.146.1 attackspambots
Automatic report - Banned IP Access
2019-11-14 20:36:30
211.105.187.10 attackspam
UTC: 2019-11-13 port: 88/tcp
2019-11-14 20:30:18
54.39.151.22 attack
2019-11-14T08:42:28.787153abusebot-2.cloudsearch.cf sshd\[4329\]: Invalid user pass1235 from 54.39.151.22 port 43276
2019-11-14 20:54:03
82.63.94.223 attackspam
Automatic report - Port Scan Attack
2019-11-14 20:46:30
106.13.45.212 attackbotsspam
2019-11-14T11:55:25.849666abusebot.cloudsearch.cf sshd\[16144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.212  user=root
2019-11-14 20:38:12

Recently Reported IPs

237.73.44.11 101.241.70.61 32.183.77.192 157.128.174.56
141.33.186.33 78.2.224.30 206.100.85.136 40.180.82.229
240.241.138.249 32.46.4.140 216.108.158.29 220.88.17.188
137.172.26.229 250.182.238.38 192.188.149.226 25.255.71.61
246.156.173.213 65.48.45.178 81.112.130.120 21.97.83.243