Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phoenix

Region: Arizona

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.104.195.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;23.104.195.139.			IN	A

;; AUTHORITY SECTION:
.			469	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111101 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 12 08:13:55 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 139.195.104.23.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.195.104.23.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.163.178.146 attack
Invalid user www from 118.163.178.146 port 45990
2019-10-10 20:33:24
222.186.180.147 attackbotsspam
$f2bV_matches
2019-10-10 20:19:25
121.157.82.202 attack
Invalid user admin2 from 121.157.82.202 port 40826
2019-10-10 20:33:10
188.16.146.219 attackbots
Invalid user admin from 188.16.146.219 port 47410
2019-10-10 20:25:15
113.162.172.211 attackbotsspam
Invalid user admin from 113.162.172.211 port 56573
2019-10-10 20:35:38
47.22.135.70 attack
Oct 10 14:12:49 MK-Soft-VM3 sshd[31950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.22.135.70 
Oct 10 14:12:52 MK-Soft-VM3 sshd[31950]: Failed password for invalid user pi from 47.22.135.70 port 58261 ssh2
...
2019-10-10 20:41:47
46.105.30.20 attack
2019-10-10T12:14:03.969315abusebot-5.cloudsearch.cf sshd\[29410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-46-105-30.eu  user=root
2019-10-10 20:43:01
81.22.45.65 attackbots
2019-10-10T14:06:38.117861+02:00 lumpi kernel: [531614.079615] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=44963 PROTO=TCP SPT=50012 DPT=4221 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-10 20:09:28
43.252.36.98 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-10 20:44:16
202.88.241.107 attackbotsspam
SSH brutforce
2019-10-10 20:22:41
129.204.123.216 attackspambots
2019-10-10T13:54:10.801217lon01.zurich-datacenter.net sshd\[18962\]: Invalid user 123 from 129.204.123.216 port 50610
2019-10-10T13:54:10.806457lon01.zurich-datacenter.net sshd\[18962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.123.216
2019-10-10T13:54:13.146399lon01.zurich-datacenter.net sshd\[18962\]: Failed password for invalid user 123 from 129.204.123.216 port 50610 ssh2
2019-10-10T13:59:08.931270lon01.zurich-datacenter.net sshd\[19064\]: Invalid user q2w3e4r5t6y7 from 129.204.123.216 port 60022
2019-10-10T13:59:08.936151lon01.zurich-datacenter.net sshd\[19064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.123.216
...
2019-10-10 20:19:09
85.230.71.108 attackspam
Invalid user pi from 85.230.71.108 port 43927
2019-10-10 20:39:53
109.190.153.178 attackbots
Oct 10 13:29:05 XXX sshd[19969]: Invalid user zimbra from 109.190.153.178 port 51601
2019-10-10 20:36:57
212.20.41.132 attackspam
Invalid user admin from 212.20.41.132 port 60558
2019-10-10 20:20:53
124.128.97.146 attackbotsspam
Invalid user ftpuser from 124.128.97.146 port 4015
2019-10-10 20:32:12

Recently Reported IPs

87.220.20.144 150.253.170.93 218.182.212.198 140.184.132.198
183.3.226.207 144.92.134.226 198.46.68.240 137.17.22.181
80.188.233.215 101.84.133.168 72.127.73.108 138.89.7.139
212.188.90.132 185.124.230.0 110.148.102.220 110.75.120.146
179.9.159.174 56.59.233.106 139.210.172.103 92.187.119.133