Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Microsoft Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.42.117.86 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 104.42.117.86 (-): 5 in the last 3600 secs - Sat Jun  9 01:58:47 2018
2020-04-30 17:49:21
104.42.117.86 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 104.42.117.86 (-): 5 in the last 3600 secs - Sat Jun  9 01:58:47 2018
2020-02-24 04:58:41
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.42.117.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23317
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.42.117.130.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 17 01:44:45 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 130.117.42.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 130.117.42.104.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
162.247.74.200 attackbots
Sep  8 18:07:26 server sshd[30228]: Failed password for root from 162.247.74.200 port 58090 ssh2
Sep  8 18:07:30 server sshd[30228]: Failed password for root from 162.247.74.200 port 58090 ssh2
Sep  8 18:07:34 server sshd[30228]: Failed password for root from 162.247.74.200 port 58090 ssh2
2020-09-09 00:22:17
121.135.10.90 attackspambots
Automatic report - Banned IP Access
2020-09-09 00:02:56
182.254.145.29 attack
SSH login attempts.
2020-09-08 23:37:55
112.120.156.177 attack
Scanned 3 times in the last 24 hours on port 22
2020-09-09 00:18:47
24.228.0.147 attackspam
Honeypot attack, port: 5555, PTR: ool-18e40093.dyn.optonline.net.
2020-09-08 23:36:01
178.128.221.85 attackbotsspam
SSH login attempts.
2020-09-08 23:42:14
84.238.46.216 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-07T17:22:27Z
2020-09-09 00:06:18
200.233.163.65 attackbotsspam
[ssh] SSH attack
2020-09-09 00:23:08
94.191.8.199 attack
Sep  8 10:33:38 root sshd[20304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.8.199 
...
2020-09-09 00:07:05
45.162.4.67 attackbotsspam
SSH login attempts.
2020-09-08 23:51:51
193.112.140.108 attackbotsspam
Sep  8 01:05:24 web1 sshd\[12758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.140.108  user=root
Sep  8 01:05:27 web1 sshd\[12758\]: Failed password for root from 193.112.140.108 port 35806 ssh2
Sep  8 01:06:16 web1 sshd\[12821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.140.108  user=root
Sep  8 01:06:17 web1 sshd\[12821\]: Failed password for root from 193.112.140.108 port 46090 ssh2
Sep  8 01:07:11 web1 sshd\[12905\]: Invalid user danilete from 193.112.140.108
Sep  8 01:07:11 web1 sshd\[12905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.140.108
2020-09-08 23:53:14
189.212.120.138 attackbotsspam
Automatic report - Port Scan Attack
2020-09-08 23:57:05
123.172.249.226 attackbotsspam
Brute forcing email accounts
2020-09-09 00:05:50
106.13.134.142 attackspam
(sshd) Failed SSH login from 106.13.134.142 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  8 10:48:46 optimus sshd[26065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.134.142  user=root
Sep  8 10:48:48 optimus sshd[26065]: Failed password for root from 106.13.134.142 port 58966 ssh2
Sep  8 10:54:08 optimus sshd[28026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.134.142  user=root
Sep  8 10:54:10 optimus sshd[28026]: Failed password for root from 106.13.134.142 port 57340 ssh2
Sep  8 10:59:37 optimus sshd[29889]: Did not receive identification string from 106.13.134.142
2020-09-09 00:13:09
212.154.85.215 attackbotsspam
20/9/7@12:50:59: FAIL: Alarm-Intrusion address from=212.154.85.215
...
2020-09-09 00:14:31

Recently Reported IPs

52.249.245.52 142.44.142.33 204.111.1.75 75.123.181.105
110.80.25.10 35.208.235.221 175.197.4.100 72.226.50.35
230.52.214.196 15.44.41.205 99.79.103.32 5.9.186.213
135.215.123.16 51.214.11.74 106.150.171.229 222.184.184.198
129.162.115.174 97.158.101.40 235.134.20.193 151.51.34.63