Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.107.213.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5726
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.107.213.104.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:16:40 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 104.213.107.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.213.107.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
70.104.197.41 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/70.104.197.41/ 
 
 US - 1H : (12)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN701 
 
 IP : 70.104.197.41 
 
 CIDR : 70.104.192.0/20 
 
 PREFIX COUNT : 7223 
 
 UNIQUE IP COUNT : 40015360 
 
 
 ATTACKS DETECTED ASN701 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-02-15 23:15:52 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-02-16 10:38:45
27.74.105.58 attack
Automatic report - Port Scan Attack
2020-02-16 10:39:12
112.186.161.154 attackbots
Unauthorized connection attempt detected from IP address 112.186.161.154 to port 81
2020-02-16 13:09:18
106.12.17.19 attack
Invalid user rao from 106.12.17.19 port 33658
2020-02-16 10:22:15
178.128.81.125 attack
Feb 16 02:01:39 ks10 sshd[652542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.125 
Feb 16 02:01:41 ks10 sshd[652542]: Failed password for invalid user admin from 178.128.81.125 port 38730 ssh2
...
2020-02-16 10:35:28
203.27.190.62 spambotsattackproxy
Hacker is deranged
2020-02-16 12:25:45
193.31.24.113 attack
02/16/2020-03:30:45.988446 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-16 10:45:38
177.104.251.122 attackspam
Feb 16 05:53:15 h1745522 sshd[6327]: Invalid user orion from 177.104.251.122 port 54287
Feb 16 05:53:15 h1745522 sshd[6327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.104.251.122
Feb 16 05:53:15 h1745522 sshd[6327]: Invalid user orion from 177.104.251.122 port 54287
Feb 16 05:53:18 h1745522 sshd[6327]: Failed password for invalid user orion from 177.104.251.122 port 54287 ssh2
Feb 16 05:56:22 h1745522 sshd[6452]: Invalid user 9@177cz from 177.104.251.122 port 26003
Feb 16 05:56:22 h1745522 sshd[6452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.104.251.122
Feb 16 05:56:22 h1745522 sshd[6452]: Invalid user 9@177cz from 177.104.251.122 port 26003
Feb 16 05:56:24 h1745522 sshd[6452]: Failed password for invalid user 9@177cz from 177.104.251.122 port 26003 ssh2
Feb 16 05:59:36 h1745522 sshd[6637]: Invalid user aline from 177.104.251.122 port 64116
...
2020-02-16 13:09:53
202.53.164.169 attackspambots
1581829183 - 02/16/2020 05:59:43 Host: 202.53.164.169/202.53.164.169 Port: 445 TCP Blocked
2020-02-16 13:03:57
93.80.14.21 attackbots
Unauthorized connection attempt from IP address 93.80.14.21 on Port 445(SMB)
2020-02-16 10:26:52
14.142.197.114 attackspam
Unauthorized connection attempt from IP address 14.142.197.114 on Port 445(SMB)
2020-02-16 10:28:21
103.74.239.110 attackbots
2020-02-15T20:35:33.8242871495-001 sshd[12688]: Invalid user test from 103.74.239.110 port 42010
2020-02-15T20:35:33.8327761495-001 sshd[12688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.239.110
2020-02-15T20:35:33.8242871495-001 sshd[12688]: Invalid user test from 103.74.239.110 port 42010
2020-02-15T20:35:36.4173621495-001 sshd[12688]: Failed password for invalid user test from 103.74.239.110 port 42010 ssh2
2020-02-15T20:41:40.5050721495-001 sshd[12992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.239.110  user=root
2020-02-15T20:41:42.4720261495-001 sshd[12992]: Failed password for root from 103.74.239.110 port 52160 ssh2
2020-02-15T20:46:20.4353841495-001 sshd[13288]: Invalid user robers from 103.74.239.110 port 48142
2020-02-15T20:46:20.4429161495-001 sshd[13288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.239.110
2020-02-15T2
...
2020-02-16 10:42:44
111.206.52.101 attackbotsspam
Excessive Port-Scanning
2020-02-16 13:11:50
175.6.140.14 attackspam
$f2bV_matches
2020-02-16 10:45:57
163.172.47.194 attack
Feb 16 05:59:33 hell sshd[23602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.47.194
Feb 16 05:59:35 hell sshd[23602]: Failed password for invalid user phantom from 163.172.47.194 port 33994 ssh2
...
2020-02-16 13:02:56

Recently Reported IPs

66.148.13.207 117.186.222.215 50.120.121.94 139.223.66.202
9.180.90.167 131.204.190.18 80.157.198.130 242.47.136.16
224.50.217.195 15.169.74.220 17.41.246.140 132.161.233.167
180.9.236.20 118.202.249.38 175.4.78.226 165.253.31.206
179.128.183.191 219.59.32.124 22.129.62.230 151.137.50.53