Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
172.104.14.201 attack
 TCP (SYN) 172.104.14.201:40250 -> port 80, len 40
2020-09-01 02:27:01
172.104.14.237 attack
GPL RPC portmap listing UDP 111 - port: 111 proto: udp cat: Decode of an RPC Querybytes: 82
2020-08-11 07:08:58
172.104.143.207 attackspambots
F2B blocked SSH BF
2020-06-16 07:49:48
172.104.142.132 attackbots
Feb 21 15:00:32 django sshd[60369]: Did not receive identification string from 172.104.142.132
Feb 21 15:04:22 django sshd[60621]: Failed password for r.r from 172.104.142.132 port 37158 ssh2
Feb 21 15:04:22 django sshd[60622]: Received disconnect from 172.104.142.132: 11: Normal Shutdown, Thank you for playing
Feb 21 15:05:22 django sshd[60687]: Failed password for r.r from 172.104.142.132 port 49220 ssh2
Feb 21 15:05:22 django sshd[60688]: Received disconnect from 172.104.142.132: 11: Normal Shutdown, Thank you for playing


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=172.104.142.132
2020-02-22 01:05:49
172.104.144.136 attackspam
Unauthorized connection attempt detected from IP address 172.104.144.136 to port 789 [J]
2020-02-04 03:22:31
172.104.146.118 attack
Mar  5 20:40:45 vpn sshd[8488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.146.118
Mar  5 20:40:47 vpn sshd[8488]: Failed password for invalid user zxin10 from 172.104.146.118 port 51328 ssh2
Mar  5 20:46:36 vpn sshd[8513]: Failed password for root from 172.104.146.118 port 55250 ssh2
2019-07-19 07:15:33
172.104.142.105 attackbotsspam
firewall-block_invalid_GET_Request
2019-06-27 08:27:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.104.14.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63751
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.104.14.65.			IN	A

;; AUTHORITY SECTION:
.			563	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091401 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 03:54:54 CST 2022
;; MSG SIZE  rcvd: 106
Host info
65.14.104.172.in-addr.arpa domain name pointer li1749-65.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
65.14.104.172.in-addr.arpa	name = li1749-65.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.176.118.178 attackspambots
Automatic report - Port Scan Attack
2019-08-25 21:56:39
31.193.30.62 attackspambots
Repeated brute force against a port
2019-08-25 22:32:08
60.211.126.74 attack
Unauthorised access (Aug 25) SRC=60.211.126.74 LEN=40 TTL=49 ID=45896 TCP DPT=8080 WINDOW=46631 SYN
2019-08-25 22:58:14
151.73.194.187 attackspambots
Telnetd brute force attack detected by fail2ban
2019-08-25 22:42:06
45.82.153.35 attackbots
08/25/2019-10:11:41.126673 45.82.153.35 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-25 22:18:37
211.174.227.230 attackbotsspam
2019-08-25 03:33:48,851 fail2ban.actions        [878]: NOTICE  [sshd] Ban 211.174.227.230
2019-08-25 06:39:13,418 fail2ban.actions        [878]: NOTICE  [sshd] Ban 211.174.227.230
2019-08-25 09:46:45,511 fail2ban.actions        [878]: NOTICE  [sshd] Ban 211.174.227.230
...
2019-08-25 22:45:59
39.36.5.130 attack
Automatic report - Port Scan Attack
2019-08-25 22:53:36
2.136.95.127 attackspam
Aug 25 15:07:01 XXX sshd[17177]: Invalid user ofsaa from 2.136.95.127 port 41442
2019-08-25 22:38:48
201.47.158.130 attack
Aug 25 13:12:49 XXX sshd[15164]: Invalid user sysomc from 201.47.158.130 port 34770
2019-08-25 22:55:37
83.201.214.157 attackbotsspam
Automatic report - Port Scan Attack
2019-08-25 22:24:02
103.60.137.4 attackspambots
2019-08-25T14:18:34.654197hub.schaetter.us sshd\[8148\]: Invalid user nadege from 103.60.137.4
2019-08-25T14:18:34.702413hub.schaetter.us sshd\[8148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.137.4
2019-08-25T14:18:36.560146hub.schaetter.us sshd\[8148\]: Failed password for invalid user nadege from 103.60.137.4 port 55446 ssh2
2019-08-25T14:24:16.694400hub.schaetter.us sshd\[8196\]: Invalid user teamspeak3 from 103.60.137.4
2019-08-25T14:24:16.727489hub.schaetter.us sshd\[8196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.137.4
...
2019-08-25 23:10:53
103.28.70.59 attackbots
Time:     Sun Aug 25 03:46:26 2019 -0400
IP:       103.28.70.59 (US/United States/103-28-70-59.static.hvvc.us)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-08-25 22:43:35
97.101.39.249 attack
SpamReport
2019-08-25 22:26:36
78.206.153.68 attack
Aug 25 15:11:50 XXX sshd[17235]: Invalid user ofsaa from 78.206.153.68 port 54840
2019-08-25 22:00:40
115.49.73.130 attack
Unauthorised access (Aug 25) SRC=115.49.73.130 LEN=40 TTL=50 ID=18727 TCP DPT=23 WINDOW=39676 SYN
2019-08-25 22:14:48

Recently Reported IPs

231.179.125.30 123.116.114.239 154.95.32.6 183.89.67.129
154.201.37.124 115.144.90.87 37.0.8.243 39.83.27.82
211.216.75.227 50.192.32.77 195.133.16.61 193.233.83.137
154.29.64.233 200.44.190.150 220.134.216.48 210.182.116.161
90.219.148.170 195.134.181.128 209.145.51.3 104.194.253.242