Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.104.147.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.104.147.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:10:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
104.147.104.2.in-addr.arpa domain name pointer 2-104-147-104-cable.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.147.104.2.in-addr.arpa	name = 2-104-147-104-cable.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.172.253.29 attackbotsspam
2020-01-15T13:20:01.040511shield sshd\[2450\]: Invalid user vncuser from 167.172.253.29 port 48376
2020-01-15T13:20:01.044069shield sshd\[2450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.253.29
2020-01-15T13:20:02.731764shield sshd\[2450\]: Failed password for invalid user vncuser from 167.172.253.29 port 48376 ssh2
2020-01-15T13:23:05.821021shield sshd\[4664\]: Invalid user mk from 167.172.253.29 port 47734
2020-01-15T13:23:05.827185shield sshd\[4664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.253.29
2020-01-16 00:20:52
87.244.5.18 attackspambots
Unauthorized connection attempt detected from IP address 87.244.5.18 to port 81 [T]
2020-01-16 00:28:50
113.53.150.162 attackspam
Unauthorized connection attempt detected from IP address 113.53.150.162 to port 81 [T]
2020-01-16 00:00:49
164.52.24.162 attackspam
Unauthorized connection attempt detected from IP address 164.52.24.162 to port 443 [J]
2020-01-16 00:21:17
119.139.196.99 attackspambots
Unauthorized connection attempt detected from IP address 119.139.196.99 to port 1433 [J]
2020-01-15 23:56:11
42.177.143.168 attackspam
Unauthorized connection attempt detected from IP address 42.177.143.168 to port 5555 [J]
2020-01-16 00:08:17
47.107.75.163 attackbots
Unauthorized connection attempt detected from IP address 47.107.75.163 to port 7001 [T]
2020-01-16 00:07:02
42.115.53.222 attack
Unauthorized connection attempt detected from IP address 42.115.53.222 to port 23 [J]
2020-01-16 00:34:58
182.85.73.85 attack
Unauthorized connection attempt detected from IP address 182.85.73.85 to port 5555 [T]
2020-01-16 00:19:43
65.19.174.198 attackspambots
Unauthorized connection attempt detected from IP address 65.19.174.198 to port 10025 [T]
2020-01-16 00:29:38
42.118.70.174 attackspambots
Unauthorized connection attempt detected from IP address 42.118.70.174 to port 23 [J]
2020-01-16 00:09:23
84.229.159.5 attackbots
Unauthorized connection attempt detected from IP address 84.229.159.5 to port 23 [J]
2020-01-16 00:05:26
27.2.103.2 attackbots
Unauthorized connection attempt detected from IP address 27.2.103.2 to port 5555 [T]
2020-01-16 00:11:01
111.118.150.240 attackspam
Unauthorized connection attempt detected from IP address 111.118.150.240 to port 2323 [J]
2020-01-16 00:03:15
1.53.66.247 attackspam
Unauthorized connection attempt detected from IP address 1.53.66.247 to port 23 [T]
2020-01-16 00:13:08

Recently Reported IPs

108.200.68.18 36.195.15.108 199.158.201.143 109.12.146.161
66.136.204.6 34.29.159.184 97.203.107.6 30.17.239.147
30.102.113.39 3.5.100.7 34.145.204.67 119.14.84.39
25.136.5.161 140.1.67.30 39.93.5.169 142.187.195.178
24.130.3.21 134.29.154.150 254.140.51.170 24.68.130.50