Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Cyprus

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.104.12.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.104.12.244.			IN	A

;; AUTHORITY SECTION:
.			318	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 07 16:50:21 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 244.12.104.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.12.104.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
71.6.232.6 attackbotsspam
Honeypot hit.
2020-01-01 01:45:04
103.235.171.29 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-01-01 01:39:07
60.60.102.221 attackbotsspam
scan z
2020-01-01 02:11:08
221.218.107.41 attackbots
Unauthorized connection attempt detected from IP address 221.218.107.41 to port 1433
2020-01-01 01:51:56
103.224.248.237 attackbots
none
2020-01-01 02:07:05
60.253.12.90 attack
Unauthorized connection attempt detected from IP address 60.253.12.90 to port 22
2020-01-01 02:10:12
121.28.131.229 attack
Unauthorized connection attempt detected from IP address 121.28.131.229 to port 1433
2020-01-01 02:00:38
94.158.177.29 attackbots
Unauthorized connection attempt detected from IP address 94.158.177.29 to port 445
2020-01-01 02:07:53
37.120.12.212 attackbotsspam
Dec 31 14:49:18 vps46666688 sshd[12806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.12.212
Dec 31 14:49:21 vps46666688 sshd[12806]: Failed password for invalid user 1234 from 37.120.12.212 port 58120 ssh2
...
2020-01-01 01:51:01
107.6.183.226 attackbots
firewall-block, port(s): 22/tcp
2020-01-01 01:50:33
183.80.119.57 attackbotsspam
Unauthorized connection attempt detected from IP address 183.80.119.57 to port 23
2020-01-01 01:49:27
58.57.4.238 attack
2019-12-31 dovecot_login authenticator failed for \(**REMOVED**\) \[58.57.4.238\]: 535 Incorrect authentication data \(set_id=nologin\)
2019-12-31 dovecot_login authenticator failed for \(**REMOVED**\) \[58.57.4.238\]: 535 Incorrect authentication data \(set_id=webmaster@**REMOVED**\)
2019-12-31 dovecot_login authenticator failed for \(**REMOVED**\) \[58.57.4.238\]: 535 Incorrect authentication data \(set_id=webmaster\)
2020-01-01 01:42:17
110.52.28.245 attackbotsspam
Unauthorized connection attempt detected from IP address 110.52.28.245 to port 80
2020-01-01 02:06:40
61.136.86.12 attackbotsspam
19/12/31@10:16:31: FAIL: Alarm-Telnet address from=61.136.86.12
...
2020-01-01 02:09:40
139.155.80.158 attack
Unauthorized connection attempt detected from IP address 139.155.80.158 to port 3389
2020-01-01 01:56:52

Recently Reported IPs

41.87.13.212 103.161.101.22 184.132.188.223 88.219.150.109
247.201.187.2 213.107.143.18 190.118.121.211 172.189.42.103
123.198.41.255 103.39.41.230 176.132.72.252 42.32.180.5
103.0.167.58 50.83.177.91 42.152.252.173 52.44.127.146
78.1.146.181 238.77.36.236 68.158.58.241 32.95.167.149