Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Minatomirai

Region: Kanagawa

Country: Japan

Internet Service Provider: Marubeni Wireless Communications Inc.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.224.220.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.224.220.104.		IN	A

;; AUTHORITY SECTION:
.			365	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022121800 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 19 00:45:56 CST 2022
;; MSG SIZE  rcvd: 108
Host info
104.220.224.119.in-addr.arpa domain name pointer h119-224-220-104.gd.netyou.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.220.224.119.in-addr.arpa	name = h119-224-220-104.gd.netyou.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.160.132.202 attackspambots
Unauthorized connection attempt from IP address 113.160.132.202 on Port 445(SMB)
2019-06-30 20:05:51
125.160.86.128 attack
Unauthorized connection attempt from IP address 125.160.86.128 on Port 445(SMB)
2019-06-30 20:24:53
14.162.144.47 attack
Unauthorized connection attempt from IP address 14.162.144.47 on Port 445(SMB)
2019-06-30 20:30:13
66.96.245.42 attackspam
Unauthorized connection attempt from IP address 66.96.245.42 on Port 445(SMB)
2019-06-30 20:22:09
128.199.100.253 attack
SSH bruteforce (Triggered fail2ban)
2019-06-30 20:35:09
154.212.180.130 attackspambots
Unauthorized connection attempt from IP address 154.212.180.130 on Port 445(SMB)
2019-06-30 20:07:16
14.231.252.160 attackspam
Unauthorized connection attempt from IP address 14.231.252.160 on Port 445(SMB)
2019-06-30 20:22:28
115.178.235.62 attackspambots
Unauthorized connection attempt from IP address 115.178.235.62 on Port 445(SMB)
2019-06-30 20:26:04
92.177.197.60 attackspambots
Jun 30 08:18:01 debian sshd\[25669\]: Invalid user mysql from 92.177.197.60 port 49695
Jun 30 08:18:01 debian sshd\[25669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.177.197.60
Jun 30 08:18:03 debian sshd\[25669\]: Failed password for invalid user mysql from 92.177.197.60 port 49695 ssh2
...
2019-06-30 20:36:52
99.37.246.236 attackspam
SSH Brute-Force attacks
2019-06-30 20:46:57
177.194.157.120 attackspam
Unauthorized connection attempt from IP address 177.194.157.120 on Port 445(SMB)
2019-06-30 20:46:38
85.175.99.19 attackbots
Unauthorized connection attempt from IP address 85.175.99.19 on Port 445(SMB)
2019-06-30 20:10:27
202.57.51.254 attackspam
Unauthorized connection attempt from IP address 202.57.51.254 on Port 445(SMB)
2019-06-30 20:04:28
191.53.248.27 attackspam
Jun 29 22:30:26 mailman postfix/smtpd[18923]: warning: unknown[191.53.248.27]: SASL PLAIN authentication failed: authentication failure
2019-06-30 20:31:36
170.246.205.59 attackbotsspam
Brute force attack to crack SMTP password (port 25 / 587)
2019-06-30 20:24:27

Recently Reported IPs

72.252.97.73 229.105.120.183 119.173.67.149 77.77.197.86
215.198.178.25 168.158.174.128 118.57.232.214 118.194.10.234
104.28.243.55 253.84.34.150 197.171.35.216 14.16.163.151
109.118.242.179 240.157.100.50 89.83.166.242 231.113.178.162
237.255.183.52 203.0.113.64 81.155.38.123 249.229.71.65