Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kansas City

Region: Kansas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.7.72.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61319
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.7.72.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 00:47:56 CST 2025
;; MSG SIZE  rcvd: 105
Host info
216.72.7.104.in-addr.arpa domain name pointer 104-7-72-216.lightspeed.mssnks.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.72.7.104.in-addr.arpa	name = 104-7-72-216.lightspeed.mssnks.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.239.147.224 attackbots
fail2ban
2020-09-13 03:20:12
110.93.223.167 attackspambots
Estimation Services
2020-09-13 03:19:30
88.18.162.144 attack
Port scan denied
2020-09-13 03:29:08
54.37.157.88 attack
Sep 12 20:25:04 raspberrypi sshd[11217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.157.88  user=root
Sep 12 20:25:07 raspberrypi sshd[11217]: Failed password for invalid user root from 54.37.157.88 port 48960 ssh2
...
2020-09-13 03:33:42
125.21.227.181 attack
Time:     Sat Sep 12 18:52:48 2020 +0000
IP:       125.21.227.181 (IN/India/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 12 18:43:51 vps3 sshd[30783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.21.227.181  user=root
Sep 12 18:43:53 vps3 sshd[30783]: Failed password for root from 125.21.227.181 port 37372 ssh2
Sep 12 18:49:10 vps3 sshd[31984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.21.227.181  user=root
Sep 12 18:49:12 vps3 sshd[31984]: Failed password for root from 125.21.227.181 port 41536 ssh2
Sep 12 18:52:47 vps3 sshd[391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.21.227.181  user=root
2020-09-13 03:12:49
157.245.172.192 attackbotsspam
Invalid user admin from 157.245.172.192 port 40198
2020-09-13 03:20:45
201.157.194.106 attackbots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-09-13 03:06:19
128.199.192.21 attackspam
Sep 11 10:07:57 dignus sshd[27042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.192.21  user=root
Sep 11 10:07:59 dignus sshd[27042]: Failed password for root from 128.199.192.21 port 44664 ssh2
Sep 11 10:12:41 dignus sshd[27477]: Invalid user owen from 128.199.192.21 port 57336
Sep 11 10:12:41 dignus sshd[27477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.192.21
Sep 11 10:12:42 dignus sshd[27477]: Failed password for invalid user owen from 128.199.192.21 port 57336 ssh2
...
2020-09-13 03:07:29
78.87.101.19 attackbots
Telnet Server BruteForce Attack
2020-09-13 03:21:42
185.217.1.242 attackspambots
Tried our host z.
2020-09-13 03:16:07
208.187.163.227 attackspambots
2020-09-11 11:39:13.597606-0500  localhost smtpd[48243]: NOQUEUE: reject: RCPT from unknown[208.187.163.227]: 554 5.7.1 Service unavailable; Client host [208.187.163.227] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-09-13 03:39:45
115.98.202.138 attackbots
Port Scan: TCP/23
2020-09-13 03:25:08
107.178.194.252 attackspam
Wordpress attack
2020-09-13 03:08:30
78.162.128.156 attack
Automatic report - Port Scan Attack
2020-09-13 03:29:37
175.173.208.131 attack
Auto Detect Rule!
proto TCP (SYN), 175.173.208.131:40228->gjan.info:23, len 40
2020-09-13 03:37:56

Recently Reported IPs

104.97.59.130 48.218.145.99 42.237.19.139 111.132.178.239
41.134.97.158 39.181.239.17 36.127.97.241 37.178.206.33
26.112.182.174 28.70.188.0 25.197.171.254 41.247.139.5
3.180.20.40 27.37.152.9 25.35.19.43 3.28.116.252
223.117.20.174 25.181.154.235 3.144.61.248 219.68.162.125