Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kachia

Region: Kaduna

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.240.104.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7354
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;197.240.104.5.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 12 15:06:06 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 5.104.240.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 5.104.240.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.159.69 attackbots
2019-10-31 01:32:36,119 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 01:49:20,886 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 02:10:32,827 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 02:27:38,930 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 02:44:57,546 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 01:32:36,119 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 01:49:20,886 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 02:10:32,827 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 02:27:38,930 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 02:44:57,546 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2019-10-31 01:32:36,119 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 104.248.159.69
2
2019-11-01 04:15:06
106.51.72.240 attackbotsspam
PostgreSQL port 5432
2019-11-01 04:10:27
93.80.62.107 attack
Unauthorized connection attempt from IP address 93.80.62.107 on Port 445(SMB)
2019-11-01 04:26:18
222.186.175.202 attackbots
Oct 31 21:27:03 MK-Soft-Root1 sshd[17153]: Failed password for root from 222.186.175.202 port 18790 ssh2
Oct 31 21:27:08 MK-Soft-Root1 sshd[17153]: Failed password for root from 222.186.175.202 port 18790 ssh2
...
2019-11-01 04:30:55
200.116.195.122 attackspam
$f2bV_matches
2019-11-01 04:02:29
178.33.151.184 attack
SSH bruteforce
2019-11-01 03:59:56
122.228.19.79 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-11-01 04:01:36
107.180.121.50 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-01 04:04:09
197.254.7.178 attack
postfix
2019-11-01 04:08:01
103.75.103.211 attack
2019-10-31T20:11:34.708968shield sshd\[18468\]: Invalid user msilva from 103.75.103.211 port 45354
2019-10-31T20:11:34.716016shield sshd\[18468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211
2019-10-31T20:11:36.970254shield sshd\[18468\]: Failed password for invalid user msilva from 103.75.103.211 port 45354 ssh2
2019-10-31T20:16:00.986536shield sshd\[19642\]: Invalid user craft from 103.75.103.211 port 54910
2019-10-31T20:16:00.992657shield sshd\[19642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211
2019-11-01 04:19:51
156.96.148.235 attack
Oct 31 16:57:21 gw1 sshd[22860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.96.148.235
Oct 31 16:57:23 gw1 sshd[22860]: Failed password for invalid user 114477114477 from 156.96.148.235 port 51708 ssh2
...
2019-11-01 04:09:58
106.75.103.35 attack
2019-10-31T12:29:39.006577abusebot-5.cloudsearch.cf sshd\[32131\]: Invalid user andre from 106.75.103.35 port 51312
2019-11-01 04:11:55
23.251.142.181 attackbots
Oct 31 21:12:08 sd-53420 sshd\[1894\]: Invalid user proteu from 23.251.142.181
Oct 31 21:12:08 sd-53420 sshd\[1894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.251.142.181
Oct 31 21:12:10 sd-53420 sshd\[1894\]: Failed password for invalid user proteu from 23.251.142.181 port 20515 ssh2
Oct 31 21:15:49 sd-53420 sshd\[2201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.251.142.181  user=root
Oct 31 21:15:51 sd-53420 sshd\[2201\]: Failed password for root from 23.251.142.181 port 59391 ssh2
...
2019-11-01 04:29:47
123.138.18.35 attackspam
Oct 31 22:55:50 hosting sshd[26404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35  user=root
Oct 31 22:55:52 hosting sshd[26404]: Failed password for root from 123.138.18.35 port 41892 ssh2
Oct 31 23:11:32 hosting sshd[27479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35  user=root
Oct 31 23:11:34 hosting sshd[27479]: Failed password for root from 123.138.18.35 port 43577 ssh2
Oct 31 23:15:50 hosting sshd[27767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35  user=root
Oct 31 23:15:52 hosting sshd[27767]: Failed password for root from 123.138.18.35 port 33977 ssh2
...
2019-11-01 04:28:11
180.76.171.53 attackspambots
Oct 31 17:50:29 MK-Soft-VM3 sshd[18941]: Failed password for root from 180.76.171.53 port 38122 ssh2
...
2019-11-01 04:08:14

Recently Reported IPs

39.110.213.252 189.59.136.217 185.43.209.173 50.24.185.237
32.168.52.9 174.110.253.220 93.42.126.148 191.35.189.123
40.86.180.19 115.113.126.244 223.15.156.38 8.67.26.77
174.254.194.149 144.175.116.122 111.246.118.119 114.139.245.220
114.41.25.86 175.8.49.128 116.101.241.184 94.247.88.35