Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: Vodafone India

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.104.109.194 attackspambots
Sep 13 15:16:55 prod4 sshd\[20345\]: Failed password for root from 42.104.109.194 port 40424 ssh2
Sep 13 15:21:30 prod4 sshd\[22260\]: Failed password for root from 42.104.109.194 port 35766 ssh2
Sep 13 15:26:06 prod4 sshd\[24092\]: Failed password for root from 42.104.109.194 port 59348 ssh2
...
2020-09-13 22:10:38
42.104.109.194 attack
Sep 13 01:46:04 mail sshd\[41887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.109.194  user=root
...
2020-09-13 14:05:33
42.104.109.194 attack
Sep 12 23:38:27 rancher-0 sshd[10342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.109.194  user=root
Sep 12 23:38:29 rancher-0 sshd[10342]: Failed password for root from 42.104.109.194 port 53816 ssh2
...
2020-09-13 05:51:19
42.104.109.194 attackbots
Invalid user ftpadmin from 42.104.109.194 port 44964
2020-09-06 13:32:56
42.104.109.194 attack
2020-09-06T02:49:26.447201hostname sshd[1749]: Invalid user dates from 42.104.109.194 port 44826
2020-09-06T02:49:28.454876hostname sshd[1749]: Failed password for invalid user dates from 42.104.109.194 port 44826 ssh2
2020-09-06T02:53:20.257417hostname sshd[3329]: Invalid user printul from 42.104.109.194 port 35282
...
2020-09-06 05:47:32
42.104.109.194 attackspambots
Invalid user eric from 42.104.109.194 port 58674
2020-09-05 03:32:03
42.104.109.194 attackspambots
Invalid user ftpadmin from 42.104.109.194 port 44964
2020-09-04 19:00:33
42.104.109.194 attackbots
Sep  1 11:55:09 server sshd[18315]: Invalid user greg from 42.104.109.194 port 48392
Sep  1 11:55:10 server sshd[18315]: Failed password for invalid user greg from 42.104.109.194 port 48392 ssh2
Sep  1 11:55:09 server sshd[18315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.109.194 
Sep  1 11:55:09 server sshd[18315]: Invalid user greg from 42.104.109.194 port 48392
Sep  1 11:55:10 server sshd[18315]: Failed password for invalid user greg from 42.104.109.194 port 48392 ssh2
...
2020-09-01 18:47:00
42.104.109.194 attack
$f2bV_matches
2020-08-29 14:26:35
42.104.109.194 attackspambots
DATE:2020-08-15 14:25:08,IP:42.104.109.194,MATCHES:10,PORT:ssh
2020-08-15 21:06:33
42.104.109.194 attackbots
Aug 13 22:28:51 rocket sshd[7357]: Failed password for root from 42.104.109.194 port 41294 ssh2
Aug 13 22:33:08 rocket sshd[7976]: Failed password for root from 42.104.109.194 port 35352 ssh2
...
2020-08-14 08:50:24
42.104.109.194 attackspambots
Aug 11 06:57:45 sso sshd[9231]: Failed password for root from 42.104.109.194 port 60772 ssh2
...
2020-08-11 13:53:56
42.104.109.194 attackspam
Aug 10 23:14:20 lnxmysql61 sshd[19416]: Failed password for root from 42.104.109.194 port 58316 ssh2
Aug 10 23:14:20 lnxmysql61 sshd[19416]: Failed password for root from 42.104.109.194 port 58316 ssh2
2020-08-11 05:46:26
42.104.109.194 attackspam
$f2bV_matches
2020-08-05 15:55:52
42.104.109.194 attackbotsspam
Invalid user ld from 42.104.109.194 port 48086
2020-07-27 07:09:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.104.1.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62000
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.104.1.47.			IN	A

;; AUTHORITY SECTION:
.			271	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041302 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 07:32:23 CST 2020
;; MSG SIZE  rcvd: 115
Host info
;; connection timed out; no servers could be reached
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 47.1.104.42.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
195.29.107.17 attackbots
Unauthorized connection attempt detected from IP address 195.29.107.17 to port 23
2020-07-22 15:47:53
93.39.189.90 attackspambots
Unauthorized connection attempt detected from IP address 93.39.189.90 to port 23
2020-07-22 15:29:00
45.113.70.213 attackspam
Unauthorized connection attempt detected from IP address 45.113.70.213 to port 1248
2020-07-22 16:05:29
36.92.185.251 attackbotsspam
Unauthorized connection attempt detected from IP address 36.92.185.251 to port 445
2020-07-22 16:07:10
80.50.102.198 attackbots
Unauthorized connection attempt detected from IP address 80.50.102.198 to port 23
2020-07-22 15:32:28
49.69.194.69 attackbotsspam
Unauthorized connection attempt detected from IP address 49.69.194.69 to port 22
2020-07-22 16:03:33
176.58.180.40 attackspam
Unauthorized connection attempt detected from IP address 176.58.180.40 to port 23
2020-07-22 15:53:21
20.49.2.187 attack
fail2ban/Jul 22 08:14:58 h1962932 sshd[18231]: Invalid user prashant from 20.49.2.187 port 56270
Jul 22 08:14:58 h1962932 sshd[18231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.2.187
Jul 22 08:14:58 h1962932 sshd[18231]: Invalid user prashant from 20.49.2.187 port 56270
Jul 22 08:15:00 h1962932 sshd[18231]: Failed password for invalid user prashant from 20.49.2.187 port 56270 ssh2
Jul 22 08:24:27 h1962932 sshd[18773]: Invalid user dell from 20.49.2.187 port 50568
2020-07-22 16:07:43
85.99.226.36 attackbots
Unauthorized connection attempt detected from IP address 85.99.226.36 to port 23
2020-07-22 15:58:39
20.52.37.203 attack
Unauthorized connection attempt detected from IP address 20.52.37.203 to port 1433
2020-07-22 15:42:59
178.84.32.18 attackbots
Unauthorized connection attempt detected from IP address 178.84.32.18 to port 80
2020-07-22 15:51:52
14.226.91.90 attackspambots
Unauthorized connection attempt detected from IP address 14.226.91.90 to port 445
2020-07-22 16:08:34
66.42.31.117 attackbotsspam
Unauthorized connection attempt detected from IP address 66.42.31.117 to port 23
2020-07-22 16:01:02
13.85.72.71 attackbots
Unauthorized connection attempt detected from IP address 13.85.72.71 to port 1433
2020-07-22 16:09:05
52.149.180.113 attack
Unauthorized connection attempt detected from IP address 52.149.180.113 to port 23
2020-07-22 15:37:04

Recently Reported IPs

219.50.107.69 85.2.28.21 114.186.95.96 41.198.227.109
155.225.130.169 38.141.63.79 69.173.46.185 218.239.193.25
148.142.95.171 63.142.144.89 5.111.170.42 163.197.123.252
24.136.185.58 168.121.56.57 138.68.6.12 200.229.100.165
168.121.56.127 87.2.145.123 211.103.63.39 116.67.210.139