Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Linode LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
 TCP (SYN) 172.104.14.201:40250 -> port 80, len 40
2020-09-01 02:27:01
Comments on same subnet:
IP Type Details Datetime
172.104.14.237 attack
GPL RPC portmap listing UDP 111 - port: 111 proto: udp cat: Decode of an RPC Querybytes: 82
2020-08-11 07:08:58
172.104.143.207 attackspambots
F2B blocked SSH BF
2020-06-16 07:49:48
172.104.142.132 attackbots
Feb 21 15:00:32 django sshd[60369]: Did not receive identification string from 172.104.142.132
Feb 21 15:04:22 django sshd[60621]: Failed password for r.r from 172.104.142.132 port 37158 ssh2
Feb 21 15:04:22 django sshd[60622]: Received disconnect from 172.104.142.132: 11: Normal Shutdown, Thank you for playing
Feb 21 15:05:22 django sshd[60687]: Failed password for r.r from 172.104.142.132 port 49220 ssh2
Feb 21 15:05:22 django sshd[60688]: Received disconnect from 172.104.142.132: 11: Normal Shutdown, Thank you for playing


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=172.104.142.132
2020-02-22 01:05:49
172.104.144.136 attackspam
Unauthorized connection attempt detected from IP address 172.104.144.136 to port 789 [J]
2020-02-04 03:22:31
172.104.146.118 attack
Mar  5 20:40:45 vpn sshd[8488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.146.118
Mar  5 20:40:47 vpn sshd[8488]: Failed password for invalid user zxin10 from 172.104.146.118 port 51328 ssh2
Mar  5 20:46:36 vpn sshd[8513]: Failed password for root from 172.104.146.118 port 55250 ssh2
2019-07-19 07:15:33
172.104.142.105 attackbotsspam
firewall-block_invalid_GET_Request
2019-06-27 08:27:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.104.14.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6191
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;172.104.14.201.			IN	A

;; AUTHORITY SECTION:
.			511	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020083101 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 01 02:26:54 CST 2020
;; MSG SIZE  rcvd: 118
Host info
201.14.104.172.in-addr.arpa domain name pointer li1749-201.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.14.104.172.in-addr.arpa	name = li1749-201.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.34.169.132 attackspam
unauthorized connection attempt
2020-01-09 17:25:49
96.40.214.228 attack
unauthorized connection attempt
2020-01-09 17:20:08
196.250.176.70 attackbots
unauthorized connection attempt
2020-01-09 17:07:04
5.24.173.157 attackbotsspam
unauthorized connection attempt
2020-01-09 17:29:21
43.248.238.89 attackbots
unauthorized connection attempt
2020-01-09 16:59:01
212.156.90.202 attack
unauthorized connection attempt
2020-01-09 17:03:37
176.40.48.61 attackbots
unauthorized connection attempt
2020-01-09 17:12:43
112.98.104.30 attackspambots
unauthorized connection attempt
2020-01-09 17:17:39
163.47.212.130 attack
unauthorized connection attempt
2020-01-09 17:15:21
202.128.88.201 attackbotsspam
unauthorized connection attempt
2020-01-09 17:04:51
91.126.204.240 attack
Unauthorized connection attempt detected from IP address 91.126.204.240 to port 5555
2020-01-09 16:56:31
167.249.85.15 attackbots
Unauthorized connection attempt detected from IP address 167.249.85.15 to port 9000
2020-01-09 17:14:59
185.234.217.237 attack
unauthorized connection attempt
2020-01-09 17:09:11
36.81.208.197 attackbotsspam
unauthorized connection attempt
2020-01-09 17:28:09
171.101.230.11 attack
unauthorized connection attempt
2020-01-09 17:14:08

Recently Reported IPs

69.164.221.39 41.39.178.214 113.163.110.57 188.112.7.142
10.220.164.243 103.139.212.212 47.31.59.243 3.41.243.229
58.74.5.29 160.20.20.184 121.23.143.135 95.6.8.7
46.36.25.33 60.25.178.135 110.137.82.94 36.74.42.151
223.238.199.169 94.25.171.187 49.232.191.230 93.47.24.9