Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholms

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.104.13.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.104.13.73.			IN	A

;; AUTHORITY SECTION:
.			575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010400 1800 900 604800 86400

;; Query time: 154 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 04 18:50:56 CST 2023
;; MSG SIZE  rcvd: 106
Host info
73.13.104.109.in-addr.arpa domain name pointer 109-104-13-73.customers.ownit.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
73.13.104.109.in-addr.arpa	name = 109-104-13-73.customers.ownit.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.200.204.11 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-22 13:06:43
185.36.81.176 attack
Rude login attack (4 tries in 1d)
2019-06-22 13:27:32
185.172.110.226 attack
" "
2019-06-22 13:57:49
185.244.25.96 attackbots
8080/tcp
[2019-06-22]1pkt
2019-06-22 13:13:09
198.108.67.109 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 13:11:03
185.193.125.42 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.193.125.42  user=root
Failed password for root from 185.193.125.42 port 46024 ssh2
Failed password for root from 185.193.125.42 port 46024 ssh2
Failed password for root from 185.193.125.42 port 46024 ssh2
Failed password for root from 185.193.125.42 port 46024 ssh2
2019-06-22 13:51:18
221.140.112.105 attack
19/6/22@00:40:12: FAIL: IoT-Telnet address from=221.140.112.105
...
2019-06-22 13:15:36
185.40.4.67 attack
\[2019-06-22 01:03:59\] NOTICE\[1849\] chan_sip.c: Registration from '\' failed for '185.40.4.67:58926' - Wrong password
\[2019-06-22 01:03:59\] SECURITY\[1857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-06-22T01:03:59.181-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7001",SessionID="0x7fc4240077d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.40.4.67/58926",Challenge="463b27d9",ReceivedChallenge="463b27d9",ReceivedHash="e8523e684075ebd6057fd0425c8200e9"
\[2019-06-22 01:05:25\] NOTICE\[1849\] chan_sip.c: Registration from '\' failed for '185.40.4.67:52488' - Wrong password
\[2019-06-22 01:05:25\] SECURITY\[1857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-06-22T01:05:25.002-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8000",SessionID="0x7fc424004288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.40.4.67/524
2019-06-22 13:08:22
178.62.42.112 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 13:17:06
87.5.203.34 attack
Automatic report - SSH Brute-Force Attack
2019-06-22 13:11:39
220.141.71.166 attack
37215/tcp
[2019-06-22]1pkt
2019-06-22 13:03:36
45.40.203.242 attackspambots
Jun 22 06:53:09 * sshd[28281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.203.242
Jun 22 06:53:11 * sshd[28281]: Failed password for invalid user ma from 45.40.203.242 port 56932 ssh2
2019-06-22 14:04:21
194.165.133.143 attackbotsspam
firewall-block, port(s): 23/tcp
2019-06-22 13:15:57
157.55.39.18 attackspambots
Jun 22 04:38:43   TCP Attack: SRC=157.55.39.18 DST=[Masked] LEN=296 TOS=0x00 PREC=0x00 TTL=104  DF PROTO=TCP SPT=14011 DPT=80 WINDOW=64240 RES=0x00 ACK PSH URGP=0
2019-06-22 13:46:00
41.142.254.186 attack
3389BruteforceFW23
2019-06-22 13:50:06

Recently Reported IPs

109.13.161.10 108.15.116.129 107.46.96.164 107.99.102.43
107.39.166.186 107.188.222.117 107.180.110.156 107.150.101.131
107.136.246.173 106.202.169.118 106.176.161.182 106.171.59.10
105.83.103.36 105.54.215.126 105.43.218.72 146.105.27.242
105.235.134.99 234.200.123.228 105.193.14.178 104.243.198.206