Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.94.128.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8452
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.94.128.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 17:27:51 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 104.128.94.185.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.128.94.185.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.116.243 attack
firewall-block, port(s): 11517/tcp
2020-09-01 20:14:50
103.69.108.169 attackbots
Attempted connection to port 445.
2020-09-01 20:29:09
111.93.93.180 normal
Computer ki sayta see ham jivan ki aneak jarurat Puri kar skate hai
2020-09-01 20:13:04
45.113.70.213 attackbots
IP 45.113.70.213 attacked honeypot on port: 111 at 9/1/2020 5:35:08 AM
2020-09-01 20:39:07
5.57.33.65 attack
20/9/1@01:19:44: FAIL: Alarm-Intrusion address from=5.57.33.65
...
2020-09-01 20:11:07
104.36.115.30 attackbotsspam
20 attempts against mh-misbehave-ban on leaf
2020-09-01 20:42:09
111.93.93.180 normal
Computer ki sayta see ham jivan ki aneak jarurat Puri kar skate hai
2020-09-01 20:12:52
49.145.200.136 attackspam
Unauthorized connection attempt from IP address 49.145.200.136 on Port 445(SMB)
2020-09-01 20:33:06
163.172.40.236 attackbots
163.172.40.236 - - [01/Sep/2020:16:14:11 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-09-01 20:14:22
141.98.9.166 attack
$f2bV_matches
2020-09-01 20:37:18
189.212.90.217 attackspambots
 TCP (SYN) 189.212.90.217:36454 -> port 445, len 40
2020-09-01 20:22:21
81.183.97.251 attackspambots
Attempted connection to port 2323.
2020-09-01 20:11:46
180.249.235.31 attack
Unauthorized connection attempt from IP address 180.249.235.31 on Port 445(SMB)
2020-09-01 20:28:02
134.236.3.88 attack
Attempted connection to port 445.
2020-09-01 20:25:20
222.186.190.2 attackspam
Sep  1 13:49:37 router sshd[19307]: Failed password for root from 222.186.190.2 port 24750 ssh2
Sep  1 13:49:41 router sshd[19307]: Failed password for root from 222.186.190.2 port 24750 ssh2
Sep  1 13:49:45 router sshd[19307]: Failed password for root from 222.186.190.2 port 24750 ssh2
Sep  1 13:49:50 router sshd[19307]: Failed password for root from 222.186.190.2 port 24750 ssh2
...
2020-09-01 20:03:30

Recently Reported IPs

148.33.255.82 48.35.244.233 14.61.54.233 137.131.226.25
48.180.216.211 59.167.204.210 108.98.16.241 164.206.249.209
44.142.112.143 238.93.61.47 206.108.211.198 60.134.124.76
160.55.4.208 174.196.146.181 154.25.138.96 176.91.143.85
86.163.55.208 65.244.56.252 245.95.42.127 143.245.210.69