Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
172.104.242.173 botsattackproxy
: SSH Bot Scanner
2024-05-10 17:36:41
172.104.242.173 botsattack
hack
2024-03-06 18:39:29
172.104.242.173 attackbots
 TCP (SYN) 172.104.242.173:40532 -> port 902, len 44
2020-10-13 00:17:28
172.104.242.173 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-12 15:40:14
172.104.242.173 attack
 TCP (SYN) 172.104.242.173:59560 -> port 666, len 44
2020-10-11 00:40:48
172.104.242.173 attack
Found on   Github Combined on 3 lists    / proto=6  .  srcport=41755  .  dstport=20 FTP  .     (706)
2020-10-10 16:29:39
172.104.242.173 attack
SIP/5060 Probe, BF, Hack -
2020-09-08 00:16:01
172.104.242.173 attackbotsspam
[Tue Aug 11 13:06:33 2020] - DDoS Attack From IP: 172.104.242.173 Port: 56229
2020-09-07 15:48:16
172.104.242.173 attackbotsspam
Multiport scan : 4 ports scanned 8332 8333 9001 9090
2020-09-07 08:10:11
172.104.242.173 attack
 TCP (SYN) 172.104.242.173:40807 -> port 5900, len 40
2020-09-04 02:59:24
172.104.242.173 attackspam
TCP ports : 4400 / 5000 / 5500 / 5722
2020-09-03 18:29:54
172.104.242.173 attackspambots
 TCP (SYN) 172.104.242.173:40996 -> port 3000, len 44
2020-09-01 03:48:37
172.104.242.173 attack
firewall-block, port(s): 995/tcp
2020-08-26 06:18:27
172.104.242.173 attackspambots
Unauthorized connection attempt detected from IP address 172.104.242.173 to port 873 [T]
2020-08-24 23:16:37
172.104.242.173 attackbots
Multiport scan : 4 ports scanned 137 138 139 143
2020-08-23 05:59:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.104.242.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.104.242.200.		IN	A

;; AUTHORITY SECTION:
.			279	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 21:57:22 CST 2022
;; MSG SIZE  rcvd: 108
Host info
200.242.104.172.in-addr.arpa domain name pointer li1819-200.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
200.242.104.172.in-addr.arpa	name = li1819-200.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.171.15.72 attackbots
Tried sshing with brute force.
2020-08-02 01:45:10
113.31.104.89 attack
Attempted Brute Force (dovecot)
2020-08-02 01:47:15
149.56.13.111 attackbots
Aug  1 17:59:20 minden010 sshd[23310]: Failed password for root from 149.56.13.111 port 58907 ssh2
Aug  1 18:03:32 minden010 sshd[24316]: Failed password for root from 149.56.13.111 port 36338 ssh2
...
2020-08-02 01:27:39
42.119.66.13 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 01:52:42
45.142.82.74 attackbotsspam
 TCP (SYN) 45.142.82.74:49097 -> port 80, len 44
2020-08-02 01:40:08
42.117.213.0 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 01:48:26
50.2.214.51 attackbotsspam
2020-08-01 07:14:42.815999-0500  localhost smtpd[52274]: NOQUEUE: reject: RCPT from unknown[50.2.214.51]: 554 5.7.1 Service unavailable; Client host [50.2.214.51] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/sbl/query/SBL491105; from=<16856-112-505852-4424-rls=customvisuals.com@mail.enlargement.buzz> to= proto=ESMTP helo=
2020-08-02 01:51:41
49.68.218.117 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 01:55:35
132.232.14.159 attack
20 attempts against mh-ssh on cloud
2020-08-02 01:38:00
222.186.180.130 attackspam
08/01/2020-13:28:45.648549 222.186.180.130 Protocol: 6 ET SCAN Potential SSH Scan
2020-08-02 01:32:10
58.186.88.187 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 01:59:21
220.132.75.140 attackbots
SSH invalid-user multiple login try
2020-08-02 02:06:56
39.76.156.183 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 18 - port: 23 proto: tcp cat: Misc Attackbytes: 60
2020-08-02 01:33:58
223.71.167.163 attackbots
[H1.VM6] Blocked by UFW
2020-08-02 02:05:34
5.206.227.136 attackbotsspam
port 23
2020-08-02 01:59:36

Recently Reported IPs

172.104.242.239 172.104.243.78 172.104.240.69 172.104.245.157
172.104.240.6 172.104.244.199 172.104.246.200 172.104.247.186
172.104.245.155 172.104.248.122 172.104.249.137 172.104.25.121
172.104.248.145 172.104.248.173 172.104.25.225 172.104.25.166
172.104.250.107 172.104.25.157 172.104.250.191 172.104.249.119