Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.213.172.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;205.213.172.104.		IN	A

;; AUTHORITY SECTION:
.			331	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 01:18:58 CST 2022
;; MSG SIZE  rcvd: 108
Host info
104.172.213.205.in-addr.arpa domain name pointer lakeland150.com.
104.172.213.205.in-addr.arpa domain name pointer helpdesk.lakeland.edu.
104.172.213.205.in-addr.arpa domain name pointer lakeland.edu.
104.172.213.205.in-addr.arpa domain name pointer tedxlakelanduniversity.com.
104.172.213.205.in-addr.arpa domain name pointer beta.lakeland.edu.
104.172.213.205.in-addr.arpa domain name pointer archive.lakeland.edu.
104.172.213.205.in-addr.arpa domain name pointer transfers.lakeland.edu.
104.172.213.205.in-addr.arpa domain name pointer ewo.lakeland.edu.
104.172.213.205.in-addr.arpa domain name pointer transfer.lakeland.edu.
104.172.213.205.in-addr.arpa domain name pointer login.lakeland.edu.
104.172.213.205.in-addr.arpa domain name pointer www.tedxlakelanduniversity.com.
104.172.213.205.in-addr.arpa domain name pointer www.lakeland150.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.172.213.205.in-addr.arpa	name = login.lakeland.edu.
104.172.213.205.in-addr.arpa	name = www.tedxlakelanduniversity.com.
104.172.213.205.in-addr.arpa	name = www.lakeland150.com.
104.172.213.205.in-addr.arpa	name = lakeland150.com.
104.172.213.205.in-addr.arpa	name = helpdesk.lakeland.edu.
104.172.213.205.in-addr.arpa	name = lakeland.edu.
104.172.213.205.in-addr.arpa	name = tedxlakelanduniversity.com.
104.172.213.205.in-addr.arpa	name = beta.lakeland.edu.
104.172.213.205.in-addr.arpa	name = archive.lakeland.edu.
104.172.213.205.in-addr.arpa	name = transfers.lakeland.edu.
104.172.213.205.in-addr.arpa	name = ewo.lakeland.edu.
104.172.213.205.in-addr.arpa	name = transfer.lakeland.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.78.30.224 attackbotsspam
Unauthorized connection attempt detected from IP address 218.78.30.224 to port 2220 [J]
2020-01-29 04:06:32
113.141.66.227 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-29 04:25:01
42.116.43.47 attackspambots
Unauthorized connection attempt detected from IP address 42.116.43.47 to port 23 [J]
2020-01-29 04:15:35
68.183.55.223 attackspam
Unauthorized connection attempt detected from IP address 68.183.55.223 to port 2220 [J]
2020-01-29 04:02:03
168.227.230.4 attackbots
scan z
2020-01-29 04:11:17
198.162.207.120 attackspam
Unauthorized connection attempt detected from IP address 198.162.207.120 to port 8080 [J]
2020-01-29 03:53:02
189.61.86.165 attackspam
Unauthorized connection attempt detected from IP address 189.61.86.165 to port 4567 [J]
2020-01-29 03:54:57
123.59.148.35 attackspambots
Unauthorized connection attempt detected from IP address 123.59.148.35 to port 23 [J]
2020-01-29 03:57:56
222.186.30.167 attackspam
Unauthorized connection attempt detected from IP address 222.186.30.167 to port 22 [T]
2020-01-29 03:50:28
113.180.93.29 attackbotsspam
Unauthorized connection attempt detected from IP address 113.180.93.29 to port 80 [J]
2020-01-29 04:24:31
51.38.71.191 attackspam
Invalid user fctrserver from 51.38.71.191 port 51548
2020-01-29 04:14:56
52.58.32.22 attackbotsspam
1433/tcp 445/tcp 1433/tcp
[2020-01-22/28]3pkt
2020-01-29 04:14:20
189.243.228.106 attackbots
Unauthorized connection attempt detected from IP address 189.243.228.106 to port 82 [J]
2020-01-29 04:09:20
119.46.1.122 attack
Unauthorized connection attempt detected from IP address 119.46.1.122 to port 8080 [J]
2020-01-29 04:23:45
79.166.173.245 attackspambots
Telnet Server BruteForce Attack
2020-01-29 03:59:39

Recently Reported IPs

145.199.50.32 205.216.28.185 205.216.45.44 213.170.247.162
205.217.182.103 154.175.174.246 20.229.5.47 20.16.52.239
30.70.171.212 78.12.118.99 245.31.66.185 173.27.37.158
253.172.162.124 241.236.29.30 232.181.104.231 142.191.189.134
204.93.168.97 166.224.224.56 59.146.199.168 148.186.168.186