Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kingston upon Hull

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.207.219.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.207.219.104.		IN	A

;; AUTHORITY SECTION:
.			546	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090200 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 23:35:42 CST 2020
;; MSG SIZE  rcvd: 119
Host info
104.219.207.194.in-addr.arpa domain name pointer adsl-194-207-219-104.karoo.kcom.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.219.207.194.in-addr.arpa	name = adsl-194-207-219-104.karoo.kcom.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
82.252.134.244 attack
unauthorized connection attempt
2020-02-13 21:04:37
36.237.137.209 attackspam
Unauthorized connection attempt from IP address 36.237.137.209 on Port 445(SMB)
2020-02-13 21:12:26
106.75.21.25 attackbotsspam
Automatic report - Banned IP Access
2020-02-13 21:01:52
103.221.254.4 attackbotsspam
Feb 13 05:45:44 MK-Soft-Root1 sshd[24429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.254.4 
Feb 13 05:45:46 MK-Soft-Root1 sshd[24429]: Failed password for invalid user supervisor from 103.221.254.4 port 57353 ssh2
...
2020-02-13 20:58:53
115.137.95.131 attackspam
Feb 13 05:45:08 grey postfix/smtpd\[18961\]: NOQUEUE: reject: RCPT from unknown\[115.137.95.131\]: 554 5.7.1 Service unavailable\; Client host \[115.137.95.131\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[115.137.95.131\]\; from=\ to=\ proto=ESMTP helo=\<\[115.137.95.131\]\>
...
2020-02-13 21:46:46
45.136.108.64 attackbots
ET SCAN MS Terminal Server Traffic on Non-standard Port
Attempted Information Leak
2020-02-13 21:02:42
140.143.241.251 attack
Invalid user grl from 140.143.241.251 port 37714
2020-02-13 21:15:52
58.187.12.46 attackspambots
Unauthorized connection attempt from IP address 58.187.12.46 on Port 445(SMB)
2020-02-13 21:45:53
159.65.41.104 attackspambots
Invalid user elastic from 159.65.41.104 port 46418
2020-02-13 21:14:18
218.64.226.43 attack
Unauthorized connection attempt from IP address 218.64.226.43 on Port 445(SMB)
2020-02-13 21:20:14
193.70.88.213 attackspambots
Feb 13 13:49:21 gw1 sshd[3356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.88.213
Feb 13 13:49:23 gw1 sshd[3356]: Failed password for invalid user vagrant from 193.70.88.213 port 39600 ssh2
...
2020-02-13 21:49:22
113.172.11.231 attack
Automatic report - Port Scan Attack
2020-02-13 21:21:23
118.71.1.35 attackspambots
Unauthorized connection attempt from IP address 118.71.1.35 on Port 445(SMB)
2020-02-13 21:48:41
92.63.196.10 attack
scans 20 times in preceeding hours on the ports (in chronological order) 35139 35179 35199 35170 35174 35164 35163 35127 35181 35149 35169 35145 35193 35152 35153 35120 35147 35168 35198 35183 resulting in total of 20 scans from 92.63.196.0/24 block.
2020-02-13 21:41:17
182.52.82.68 attack
Unauthorized connection attempt from IP address 182.52.82.68 on Port 445(SMB)
2020-02-13 21:47:07

Recently Reported IPs

161.147.56.128 58.243.169.60 157.173.75.5 131.152.206.86
171.129.4.40 186.135.47.158 122.176.231.239 113.102.181.89
60.137.105.250 120.20.167.215 145.210.140.187 202.182.233.113
60.2.233.54 180.0.49.52 51.93.145.92 102.224.159.246
179.62.238.49 45.76.136.14 138.212.103.101 64.40.105.197