Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.104.53.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.104.53.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 12:21:11 CST 2025
;; MSG SIZE  rcvd: 103
Host info
7.53.104.3.in-addr.arpa domain name pointer ec2-3-104-53-7.ap-southeast-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.53.104.3.in-addr.arpa	name = ec2-3-104-53-7.ap-southeast-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.117 attack
Sep 12 23:16:06 eventyay sshd[15066]: Failed password for root from 222.186.42.117 port 54016 ssh2
Sep 12 23:16:07 eventyay sshd[15066]: Failed password for root from 222.186.42.117 port 54016 ssh2
Sep 12 23:16:09 eventyay sshd[15066]: Failed password for root from 222.186.42.117 port 54016 ssh2
...
2019-09-13 05:21:37
131.221.168.90 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-07-17/09-11]6pkt,1pt.(tcp)
2019-09-13 05:20:46
69.94.143.26 attackbots
Autoban   69.94.143.26 AUTH/CONNECT
2019-09-13 05:32:01
178.128.217.58 attack
Sep 12 22:33:53 tux-35-217 sshd\[28815\]: Invalid user 1234 from 178.128.217.58 port 34260
Sep 12 22:33:53 tux-35-217 sshd\[28815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58
Sep 12 22:33:54 tux-35-217 sshd\[28815\]: Failed password for invalid user 1234 from 178.128.217.58 port 34260 ssh2
Sep 12 22:40:37 tux-35-217 sshd\[28836\]: Invalid user luser from 178.128.217.58 port 41028
Sep 12 22:40:37 tux-35-217 sshd\[28836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58
...
2019-09-13 05:39:37
43.226.66.35 attackbotsspam
Sep 12 17:15:36 vps691689 sshd[23960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.66.35
Sep 12 17:15:38 vps691689 sshd[23960]: Failed password for invalid user gitpass from 43.226.66.35 port 40960 ssh2
...
2019-09-13 05:41:20
77.123.154.234 attack
F2B jail: sshd. Time: 2019-09-12 22:50:23, Reported by: VKReport
2019-09-13 05:03:26
112.81.113.58 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-09-13 05:11:11
213.219.39.113 attackbotsspam
Sep 12 16:25:31 srv1 postfix/smtpd[2529]: connect from li1098-113.members.linode.com[213.219.39.113]
Sep x@x
Sep 12 16:25:37 srv1 postfix/smtpd[2529]: disconnect from li1098-113.members.linode.com[213.219.39.113]
Sep 12 16:26:05 srv1 postfix/smtpd[28076]: connect from li1098-113.members.linode.com[213.219.39.113]
Sep x@x
Sep 12 16:26:10 srv1 postfix/smtpd[28076]: disconnect from li1098-113.members.linode.com[213.219.39.113]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.219.39.113
2019-09-13 05:34:38
103.72.163.222 attackbots
Sep 12 11:26:19 sachi sshd\[328\]: Invalid user postgres from 103.72.163.222
Sep 12 11:26:19 sachi sshd\[328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.163.222
Sep 12 11:26:21 sachi sshd\[328\]: Failed password for invalid user postgres from 103.72.163.222 port 31705 ssh2
Sep 12 11:33:20 sachi sshd\[956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.163.222  user=mysql
Sep 12 11:33:22 sachi sshd\[956\]: Failed password for mysql from 103.72.163.222 port 32058 ssh2
2019-09-13 05:35:18
186.64.121.145 attackspambots
2019-09-12T20:48:13.490169abusebot-2.cloudsearch.cf sshd\[4610\]: Invalid user mc from 186.64.121.145 port 43182
2019-09-13 05:43:59
180.191.92.172 attackspam
445/tcp
[2019-09-12]1pkt
2019-09-13 05:21:57
140.255.115.3 attack
Sep 12 16:22:27 mx01 sshd[15862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.255.115.3  user=r.r
Sep 12 16:22:29 mx01 sshd[15862]: Failed password for r.r from 140.255.115.3 port 46834 ssh2
Sep 12 16:22:31 mx01 sshd[15862]: Failed password for r.r from 140.255.115.3 port 46834 ssh2
Sep 12 16:22:33 mx01 sshd[15862]: Failed password for r.r from 140.255.115.3 port 46834 ssh2
Sep 12 16:22:36 mx01 sshd[15862]: Failed password for r.r from 140.255.115.3 port 46834 ssh2
Sep 12 16:22:38 mx01 sshd[15862]: Failed password for r.r from 140.255.115.3 port 46834 ssh2
Sep 12 16:22:41 mx01 sshd[15862]: Failed password for r.r from 140.255.115.3 port 46834 ssh2
Sep 12 16:22:41 mx01 sshd[15862]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.255.115.3  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=140.255.115.3
2019-09-13 05:09:14
222.186.31.136 attackbotsspam
Sep 12 11:20:21 sachi sshd\[32272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
Sep 12 11:20:23 sachi sshd\[32272\]: Failed password for root from 222.186.31.136 port 17448 ssh2
Sep 12 11:20:29 sachi sshd\[32285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
Sep 12 11:20:32 sachi sshd\[32285\]: Failed password for root from 222.186.31.136 port 15823 ssh2
Sep 12 11:20:34 sachi sshd\[32285\]: Failed password for root from 222.186.31.136 port 15823 ssh2
2019-09-13 05:26:02
51.83.72.108 attack
Sep 12 21:12:22 hb sshd\[3667\]: Invalid user 1q2w3e4r from 51.83.72.108
Sep 12 21:12:22 hb sshd\[3667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.ip-51-83-72.eu
Sep 12 21:12:25 hb sshd\[3667\]: Failed password for invalid user 1q2w3e4r from 51.83.72.108 port 41754 ssh2
Sep 12 21:17:53 hb sshd\[4151\]: Invalid user mysql1234 from 51.83.72.108
Sep 12 21:17:53 hb sshd\[4151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.ip-51-83-72.eu
2019-09-13 05:32:25
173.245.239.219 attack
2019/09/12 14:47:54 \[error\] 3998\#0: \*2359 An error occurred in mail zmauth: user not found:kownacki62@*fathog.com while SSL handshaking to lookup handler, client: 173.245.239.219:38882, server: 45.79.145.195:993, login: "kownacki62@*fathog.com"
2019-09-13 05:04:20

Recently Reported IPs

116.217.221.100 50.125.228.6 52.19.214.50 122.123.63.183
147.72.23.173 107.136.232.165 154.150.76.139 21.217.149.252
44.162.162.66 147.115.92.248 185.252.22.158 33.220.50.229
17.115.172.200 192.184.246.207 192.6.110.87 9.121.105.47
207.220.149.238 76.143.139.7 70.111.151.106 84.2.113.193