Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
172.104.142.132 attackbots
Feb 21 15:00:32 django sshd[60369]: Did not receive identification string from 172.104.142.132
Feb 21 15:04:22 django sshd[60621]: Failed password for r.r from 172.104.142.132 port 37158 ssh2
Feb 21 15:04:22 django sshd[60622]: Received disconnect from 172.104.142.132: 11: Normal Shutdown, Thank you for playing
Feb 21 15:05:22 django sshd[60687]: Failed password for r.r from 172.104.142.132 port 49220 ssh2
Feb 21 15:05:22 django sshd[60688]: Received disconnect from 172.104.142.132: 11: Normal Shutdown, Thank you for playing


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=172.104.142.132
2020-02-22 01:05:49
172.104.142.105 attackbotsspam
firewall-block_invalid_GET_Request
2019-06-27 08:27:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.104.142.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.104.142.63.			IN	A

;; AUTHORITY SECTION:
.			187	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 21:55:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
63.142.104.172.in-addr.arpa domain name pointer li1658-63.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
63.142.104.172.in-addr.arpa	name = li1658-63.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.66.230.36 attackspam
RDPBruteCAu
2019-12-11 08:01:51
105.198.236.99 attackspam
Unauthorized connection attempt from IP address 105.198.236.99 on Port 445(SMB)
2019-12-11 08:24:20
178.21.164.100 attackspambots
SSH bruteforce (Triggered fail2ban)
2019-12-11 08:08:18
112.85.42.194 attackspam
Dec 11 00:41:14 srv206 sshd[21255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194  user=root
Dec 11 00:41:16 srv206 sshd[21255]: Failed password for root from 112.85.42.194 port 49008 ssh2
...
2019-12-11 08:22:50
45.82.153.140 attackspambots
Brute force attack stopped by firewall
2019-12-11 07:52:56
35.192.190.43 attack
RDPBruteGSL24
2019-12-11 08:01:15
190.74.197.70 attack
Unauthorized connection attempt from IP address 190.74.197.70 on Port 445(SMB)
2019-12-11 07:56:38
94.23.4.68 attackspambots
$f2bV_matches
2019-12-11 08:03:36
91.83.188.197 attackspambots
Unauthorized connection attempt detected from IP address 91.83.188.197 to port 445
2019-12-11 08:21:35
220.167.166.25 attack
Unauthorized connection attempt from IP address 220.167.166.25 on Port 445(SMB)
2019-12-11 08:02:21
45.184.225.2 attackspam
SSH bruteforce
2019-12-11 08:25:03
192.99.7.175 attackspam
Dec 10 21:47:32 flomail postfix/smtpd[4018]: NOQUEUE: reject: RCPT from ns508073.ip-192-99-7.net[192.99.7.175]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
Dec 10 21:51:04 flomail postfix/smtpd[4414]: NOQUEUE: reject: RCPT from ns508073.ip-192-99-7.net[192.99.7.175]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
Dec 10 21:52:00 flomail postfix/smtpd[4445]: NOQUEUE: reject: RCPT from ns508073.ip-192-99-7.net[192.99.7.175]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
2019-12-11 08:20:25
51.77.148.77 attackspam
$f2bV_matches
2019-12-11 08:19:40
5.58.1.244 attackbots
Unauthorized connection attempt detected from IP address 5.58.1.244 to port 445
2019-12-11 08:07:21
176.214.60.193 attackbots
(Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=13785 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=13378 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=164 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=6012 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=17005 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=18387 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=30882 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=23089 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=24453 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec 10)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=22857 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec  9)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=4702 DF TCP DPT=445 WINDOW=8192 SYN 
 (Dec  9)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=6913 DF TC...
2019-12-11 08:24:02

Recently Reported IPs

172.104.146.235 172.104.144.129 172.104.146.238 172.104.149.112
172.104.148.101 172.104.149.181 172.104.147.214 172.104.147.250
172.104.148.24 172.104.148.188 172.104.148.50 172.104.15.176
172.104.149.80 172.104.15.205 172.104.15.188 172.104.15.46
172.104.150.228 172.104.150.133 172.104.150.45 172.104.151.198