Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.104.95.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.104.95.242.			IN	A

;; AUTHORITY SECTION:
.			504	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 12 01:08:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 242.95.104.38.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.95.104.38.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.59.100.243 attackspambots
prod3
...
2020-04-21 03:28:56
45.5.0.7 attackbots
5x Failed Password
2020-04-21 03:52:33
106.13.234.36 attackbotsspam
Apr 20 18:10:54 ns381471 sshd[15094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.36
Apr 20 18:10:56 ns381471 sshd[15094]: Failed password for invalid user test from 106.13.234.36 port 52013 ssh2
2020-04-21 03:32:20
103.214.129.204 attackspambots
SSHD brute force attack detected by fail2ban
2020-04-21 03:36:14
114.67.100.245 attackspam
Apr 20 19:22:13 163-172-32-151 sshd[22641]: Invalid user test10 from 114.67.100.245 port 33790
...
2020-04-21 03:26:18
95.110.229.194 attackspam
Apr 20 12:21:58 mockhub sshd[9516]: Failed password for root from 95.110.229.194 port 37496 ssh2
...
2020-04-21 03:39:27
54.38.241.171 attackspam
$f2bV_matches
2020-04-21 03:45:18
164.132.108.195 attackspam
$f2bV_matches
2020-04-21 04:03:23
37.49.226.184 attackbots
Invalid user admin from 37.49.226.184 port 57796
2020-04-21 03:55:32
14.140.10.101 attackbots
Apr 20 19:55:14 *host* sshd\[19544\]: User *user* from 14.140.10.101 not allowed because none of user's groups are listed in AllowGroups
2020-04-21 03:57:59
35.203.18.146 attackspam
Apr 20 22:44:04 pkdns2 sshd\[61419\]: Invalid user oracle from 35.203.18.146Apr 20 22:44:06 pkdns2 sshd\[61419\]: Failed password for invalid user oracle from 35.203.18.146 port 34734 ssh2Apr 20 22:47:22 pkdns2 sshd\[61583\]: Failed password for root from 35.203.18.146 port 50006 ssh2Apr 20 22:49:47 pkdns2 sshd\[61671\]: Failed password for root from 35.203.18.146 port 52978 ssh2Apr 20 22:52:02 pkdns2 sshd\[61805\]: Invalid user pp from 35.203.18.146Apr 20 22:52:04 pkdns2 sshd\[61805\]: Failed password for invalid user pp from 35.203.18.146 port 55950 ssh2
...
2020-04-21 03:55:50
61.216.17.26 attack
Invalid user k from 61.216.17.26 port 19264
2020-04-21 03:44:01
114.67.241.171 attack
Invalid user qh from 114.67.241.171 port 48150
2020-04-21 03:26:04
103.104.119.107 attack
Wordpress Admin Login attack
2020-04-21 04:01:53
111.229.123.125 attack
SSH login attempts.
2020-04-21 03:28:41

Recently Reported IPs

24.119.118.194 189.222.195.226 144.168.236.35 201.150.185.181
144.168.253.112 177.84.174.238 206.1.209.136 209.127.76.127
45.174.168.3 177.106.151.216 91.235.124.17 149.18.58.42
38.54.16.167 38.44.89.198 149.18.31.40 198.74.56.87
125.183.170.194 89.191.226.180 123.200.7.46 78.135.74.216