Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.104.138.186
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.104.138.186.		IN	A

;; AUTHORITY SECTION:
.			240	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 11:01:01 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 186.138.104.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 186.138.104.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.245.47.108 attackspam
port scan and connect, tcp 22 (ssh)
2019-12-25 04:43:54
144.91.82.33 attack
SIPVicious Scanner Detection
2019-12-25 04:26:06
182.16.245.54 attackspam
proto=tcp  .  spt=41513  .  dpt=25  .     (Found on   Dark List de Dec 24)     (452)
2019-12-25 04:21:04
91.121.222.204 attackbots
Invalid user abc from 91.121.222.204 port 36218
2019-12-25 04:52:12
196.220.67.2 attack
"SSH brute force auth login attempt."
2019-12-25 04:50:24
62.97.43.92 attack
firewall-block, port(s): 80/tcp
2019-12-25 04:43:13
200.141.251.74 attackbots
Unauthorized connection attempt from IP address 200.141.251.74 on Port 445(SMB)
2019-12-25 04:33:56
156.220.233.243 attackspambots
Mirai and Reaper Exploitation Traffic
2019-12-25 04:24:02
82.77.63.42 attack
Unauthorized connection attempt from IP address 82.77.63.42 on Port 445(SMB)
2019-12-25 04:37:05
49.88.112.55 attackspam
2019-12-24T20:18:58.940537abusebot-8.cloudsearch.cf sshd[15841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2019-12-24T20:19:01.104946abusebot-8.cloudsearch.cf sshd[15841]: Failed password for root from 49.88.112.55 port 41454 ssh2
2019-12-24T20:19:04.410772abusebot-8.cloudsearch.cf sshd[15841]: Failed password for root from 49.88.112.55 port 41454 ssh2
2019-12-24T20:18:58.940537abusebot-8.cloudsearch.cf sshd[15841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2019-12-24T20:19:01.104946abusebot-8.cloudsearch.cf sshd[15841]: Failed password for root from 49.88.112.55 port 41454 ssh2
2019-12-24T20:19:04.410772abusebot-8.cloudsearch.cf sshd[15841]: Failed password for root from 49.88.112.55 port 41454 ssh2
2019-12-24T20:18:58.940537abusebot-8.cloudsearch.cf sshd[15841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2019-12-25 04:20:22
111.119.178.189 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-12-25 04:51:39
177.73.99.252 attackbots
Unauthorized connection attempt from IP address 177.73.99.252 on Port 445(SMB)
2019-12-25 04:30:11
195.154.119.75 attack
$f2bV_matches
2019-12-25 04:39:38
115.79.141.10 attackbotsspam
Unauthorized connection attempt from IP address 115.79.141.10 on Port 445(SMB)
2019-12-25 04:22:52
43.228.71.147 attackspam
Unauthorized connection attempt detected from IP address 43.228.71.147 to port 1433
2019-12-25 04:18:41

Recently Reported IPs

127.184.7.148 217.151.40.13 168.194.231.177 45.201.132.91
144.55.22.231 139.231.164.63 125.142.98.45 204.111.178.228
1.175.77.147 113.122.132.11 111.150.238.47 188.253.236.187
45.144.19.97 113.185.73.169 203.73.58.17 56.97.70.43
92.32.149.192 42.242.11.34 87.217.143.178 54.122.251.211