Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.59.241.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.59.241.104.			IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:39:54 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 104.241.59.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.241.59.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.100.120.84 attackspambots
Jun 24 08:08:33 server01 sshd\[24778\]: Invalid user jordan from 88.100.120.84
Jun 24 08:08:33 server01 sshd\[24778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.100.120.84
Jun 24 08:08:35 server01 sshd\[24778\]: Failed password for invalid user jordan from 88.100.120.84 port 55296 ssh2
...
2019-06-24 18:10:18
59.120.243.8 attack
Jun 24 10:35:56 mail sshd\[26791\]: Failed password for invalid user jv from 59.120.243.8 port 60330 ssh2
Jun 24 10:52:13 mail sshd\[26860\]: Invalid user mp3 from 59.120.243.8 port 49438
Jun 24 10:52:13 mail sshd\[26860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.243.8
...
2019-06-24 19:38:08
82.85.143.181 attackspam
Jun 24 09:10:15 [munged] sshd[6560]: Invalid user juegos from 82.85.143.181 port 10730
Jun 24 09:10:15 [munged] sshd[6560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.85.143.181
2019-06-24 19:32:16
37.49.227.12 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-06-24 18:48:50
201.216.193.65 attackspambots
Jun 24 08:04:38 sshgateway sshd\[11498\]: Invalid user developer from 201.216.193.65
Jun 24 08:04:38 sshgateway sshd\[11498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.216.193.65
Jun 24 08:04:40 sshgateway sshd\[11498\]: Failed password for invalid user developer from 201.216.193.65 port 52091 ssh2
2019-06-24 18:16:59
183.82.218.212 attackbots
Unauthorised access (Jun 24) SRC=183.82.218.212 LEN=52 PREC=0x20 TTL=113 ID=21615 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-24 18:22:32
14.215.176.148 attackbotsspam
Automatic report - Web App Attack
2019-06-24 18:08:46
219.73.114.139 attackspam
Jun 24 11:35:49 mail sshd\[7971\]: Invalid user stephan from 219.73.114.139 port 55104
Jun 24 11:35:49 mail sshd\[7971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.73.114.139
Jun 24 11:35:51 mail sshd\[7971\]: Failed password for invalid user stephan from 219.73.114.139 port 55104 ssh2
Jun 24 11:37:30 mail sshd\[8202\]: Invalid user marwan from 219.73.114.139 port 39814
Jun 24 11:37:30 mail sshd\[8202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.73.114.139
2019-06-24 18:30:07
207.154.211.36 attackspam
SSH bruteforce (Triggered fail2ban)
2019-06-24 17:56:29
191.53.199.150 attackspambots
failed_logins
2019-06-24 19:32:38
186.227.181.159 attackbotsspam
Unauthorized SMTP/IMAP/POP3 connection attempt
2019-06-24 19:31:46
194.153.113.13 attackspam
Automatic report - Web App Attack
2019-06-24 19:31:18
116.31.116.2 attack
2019-06-24T04:46:18.702661abusebot-4.cloudsearch.cf sshd\[5707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.116.2  user=root
2019-06-24 18:19:53
103.85.8.228 attack
Automatic report - Web App Attack
2019-06-24 19:33:04
213.230.70.174 attackspambots
Jun 24 05:56:39 plesk sshd[16040]: Address 213.230.70.174 maps to 174.64.uzpak.uz, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 24 05:56:39 plesk sshd[16040]: Invalid user deploy from 213.230.70.174
Jun 24 05:56:39 plesk sshd[16040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.70.174 
Jun 24 05:56:42 plesk sshd[16040]: Failed password for invalid user deploy from 213.230.70.174 port 57861 ssh2
Jun 24 05:56:42 plesk sshd[16040]: Received disconnect from 213.230.70.174: 11: Bye Bye [preauth]
Jun 24 06:13:56 plesk sshd[16527]: Address 213.230.70.174 maps to 174.64.uzpak.uz, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 24 06:13:56 plesk sshd[16527]: Invalid user db2prod from 213.230.70.174
Jun 24 06:13:56 plesk sshd[16527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.70.174 
Jun 24 06:13:57 plesk sshd[16527]: Fai........
-------------------------------
2019-06-24 18:30:29

Recently Reported IPs

42.224.32.45 117.143.175.239 45.173.4.190 64.251.15.62
119.117.153.241 177.67.164.219 172.70.93.10 14.207.78.89
79.127.78.49 8.218.9.101 109.86.1.54 87.11.242.123
59.95.77.51 93.168.161.202 182.114.93.246 183.234.167.251
106.1.18.166 88.201.195.156 111.29.251.11 14.161.19.3