Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.58.239.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.58.239.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:23:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
57.239.58.104.in-addr.arpa domain name pointer 104-58-239-57.lightspeed.rcsntx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.239.58.104.in-addr.arpa	name = 104-58-239-57.lightspeed.rcsntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.181.120.179 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-01-20 19:31:42
91.211.247.153 attackspambots
Automatic report - SSH Brute-Force Attack
2020-01-20 20:01:51
223.15.31.246 attackbots
Unauthorized connection attempt detected from IP address 223.15.31.246 to port 23 [J]
2020-01-20 19:47:26
116.48.57.61 attackspam
Unauthorized connection attempt detected from IP address 116.48.57.61 to port 5555 [J]
2020-01-20 19:57:33
111.175.58.1 attackbots
Unauthorized connection attempt detected from IP address 111.175.58.1 to port 443 [J]
2020-01-20 19:35:26
4.36.112.248 attackspam
Unauthorized connection attempt detected from IP address 4.36.112.248 to port 23 [J]
2020-01-20 19:45:59
41.139.132.173 attackspambots
Unauthorized connection attempt detected from IP address 41.139.132.173 to port 85 [J]
2020-01-20 19:44:16
119.28.234.30 attack
Unauthorized connection attempt detected from IP address 119.28.234.30 to port 43 [J]
2020-01-20 19:32:59
35.143.204.177 attackspam
Unauthorized connection attempt detected from IP address 35.143.204.177 to port 88 [J]
2020-01-20 19:44:40
182.57.2.120 attackspam
Unauthorized connection attempt detected from IP address 182.57.2.120 to port 88 [J]
2020-01-20 19:52:38
103.52.216.181 attack
Unauthorized connection attempt detected from IP address 103.52.216.181 to port 1935 [J]
2020-01-20 19:59:48
83.150.59.55 attackspambots
Unauthorized connection attempt detected from IP address 83.150.59.55 to port 5555 [J]
2020-01-20 19:40:40
185.109.248.125 attackspam
Unauthorized connection attempt detected from IP address 185.109.248.125 to port 8080 [J]
2020-01-20 19:52:11
185.176.27.166 attack
01/20/2020-11:55:06.073262 185.176.27.166 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-20 19:27:17
189.226.119.252 attackspambots
Unauthorized connection attempt detected from IP address 189.226.119.252 to port 80 [J]
2020-01-20 19:51:21

Recently Reported IPs

184.193.179.136 97.93.235.173 226.182.109.110 54.97.231.49
24.67.234.225 34.118.91.56 154.44.245.56 73.112.214.253
56.200.121.205 7.166.12.244 170.203.251.151 185.231.105.116
36.5.196.39 244.79.221.139 242.242.115.86 87.78.69.18
37.138.66.254 66.12.233.194 50.61.79.246 160.182.9.235