Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.69.230.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;243.69.230.104.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:54:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 104.230.69.243.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.230.69.243.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.94.59.114 attackbots
218.94.59.114 was recorded 5 times by 3 hosts attempting to connect to the following ports: 3389. Incident counter (4h, 24h, all-time): 5, 20, 61
2019-11-16 22:32:13
171.241.1.108 attack
Unauthorized connection attempt from IP address 171.241.1.108 on Port 445(SMB)
2019-11-16 22:21:34
148.240.238.91 attackbots
Lines containing failures of 148.240.238.91
Nov 15 18:30:56 localhost sshd[22405]: Invalid user hostnamechi from 148.240.238.91 port 50466
Nov 15 18:30:56 localhost sshd[22405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.240.238.91
Nov 15 18:30:57 localhost sshd[22405]: Failed password for invalid user hostnamechi from 148.240.238.91 port 50466 ssh2
Nov 15 18:30:59 localhost sshd[22405]: Received disconnect from 148.240.238.91 port 50466:11: Bye Bye [preauth]
Nov 15 18:30:59 localhost sshd[22405]: Disconnected from invalid user hostnamechi 148.240.238.91 port 50466 [preauth]
Nov 15 18:54:11 localhost sshd[23492]: Invalid user horsman from 148.240.238.91 port 48956
Nov 15 18:54:11 localhost sshd[23492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.240.238.91
Nov 15 18:54:13 localhost sshd[23492]: Failed password for invalid user horsman from 148.240.238.91 port 48956 ssh2
Nov 1........
------------------------------
2019-11-16 22:26:28
78.100.235.19 attackspam
Unauthorized connection attempt from IP address 78.100.235.19 on Port 445(SMB)
2019-11-16 22:38:22
180.246.118.226 attack
UTC: 2019-11-15 port: 23/tcp
2019-11-16 22:36:07
41.137.137.92 attack
Invalid user aba from 41.137.137.92 port 45382
2019-11-16 22:08:18
61.5.153.138 attackbotsspam
Unauthorized connection attempt from IP address 61.5.153.138 on Port 445(SMB)
2019-11-16 22:41:07
194.28.112.141 attackspam
11/16/2019-08:51:24.686304 194.28.112.141 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-16 22:22:34
122.176.31.111 attack
Unauthorized connection attempt from IP address 122.176.31.111 on Port 445(SMB)
2019-11-16 22:21:00
187.108.207.59 attack
Invalid user shivdarsan from 187.108.207.59 port 59024
2019-11-16 22:31:33
188.191.1.173 attackbots
Unauthorised access (Nov 16) SRC=188.191.1.173 LEN=40 TTL=242 ID=14512 DF TCP DPT=23 WINDOW=14600 SYN
2019-11-16 22:11:41
54.203.124.33 attackspam
Nov 16 08:39:45 OPSO sshd\[8612\]: Invalid user gerfrid from 54.203.124.33 port 41224
Nov 16 08:39:45 OPSO sshd\[8612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.203.124.33
Nov 16 08:39:47 OPSO sshd\[8612\]: Failed password for invalid user gerfrid from 54.203.124.33 port 41224 ssh2
Nov 16 08:44:09 OPSO sshd\[9578\]: Invalid user himalaya from 54.203.124.33 port 50916
Nov 16 08:44:09 OPSO sshd\[9578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.203.124.33
2019-11-16 22:05:57
218.64.39.67 attack
2019-11-16 00:16:15 dovecot_login authenticator failed for (syaqiim.com) [218.64.39.67]:49992 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-11-16 00:16:28 dovecot_login authenticator failed for (syaqiim.com) [218.64.39.67]:50939 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-11-16 00:16:52 dovecot_login authenticator failed for (syaqiim.com) [218.64.39.67]:51280 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
...
2019-11-16 22:31:09
119.137.54.246 attack
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Invalid user crap from 119.137.54.246 port 21753
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Failed password for invalid user crap from 119.137.54.246 port 21753 ssh2
Nov 15 06:27:48 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:48 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Received disconnect from 119.137.54.246 port 21753:11: Bye Bye [preauth]
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Disconnected from 119.137.54.246 port 21753 [preauth]
Nov 15 06:27:49 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:49 ACSRAD auth.warn sshguard[3498]: Blocking "119.137.54.246/32" forever (3 attacks in 1 secs, after 2 abuses over 577 secs.)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=
2019-11-16 22:40:40
187.9.23.170 attackbotsspam
Unauthorized connection attempt from IP address 187.9.23.170 on Port 445(SMB)
2019-11-16 22:46:30

Recently Reported IPs

224.1.139.4 130.179.36.137 31.145.150.164 121.184.7.204
78.227.62.130 199.93.26.248 159.193.255.133 251.138.92.192
214.73.238.220 232.80.210.248 19.220.176.106 241.233.110.92
227.138.56.92 145.213.239.55 25.181.71.85 202.201.179.28
15.152.183.224 172.198.56.98 34.224.151.199 108.202.168.240