Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: LG DACOM Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.42.104.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47113
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;61.42.104.109.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 19 01:47:10 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 109.104.42.61.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 109.104.42.61.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.150 attackbots
Oct 15 23:41:16 fr01 sshd[25565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Oct 15 23:41:17 fr01 sshd[25565]: Failed password for root from 222.186.175.150 port 29032 ssh2
...
2019-10-16 05:51:35
211.136.105.74 attackbots
SSH brutforce
2019-10-16 05:42:05
1.171.26.146 attack
Fail2Ban Ban Triggered
2019-10-16 05:21:53
89.120.75.63 attackspam
34567/tcp
[2019-10-15]1pkt
2019-10-16 05:32:50
46.246.65.200 attackbotsspam
Automatic report - Banned IP Access
2019-10-16 05:23:21
156.208.18.30 attack
23/tcp
[2019-10-15]1pkt
2019-10-16 05:50:28
94.191.108.176 attackspambots
2019-10-15T21:38:50.159791shield sshd\[31973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176  user=root
2019-10-15T21:38:52.116175shield sshd\[31973\]: Failed password for root from 94.191.108.176 port 38728 ssh2
2019-10-15T21:43:04.348387shield sshd\[32557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176  user=root
2019-10-15T21:43:06.174301shield sshd\[32557\]: Failed password for root from 94.191.108.176 port 45744 ssh2
2019-10-15T21:47:22.867506shield sshd\[1056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176  user=root
2019-10-16 05:52:57
189.186.135.4 attackbots
Forged login request.
2019-10-16 05:51:18
218.28.10.70 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 1433[TCP]
2019-10-16 05:37:04
212.200.122.82 attack
" "
2019-10-16 05:38:05
134.175.0.75 attack
2019-10-15T21:33:24.662072abusebot-2.cloudsearch.cf sshd\[7352\]: Invalid user froze from 134.175.0.75 port 39402
2019-10-16 05:41:10
182.75.248.254 attackspam
Oct 16 00:42:26 pkdns2 sshd\[52416\]: Address 182.75.248.254 maps to nsg-static-254.248.75.182-airtel.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 16 00:42:26 pkdns2 sshd\[52416\]: Invalid user xp from 182.75.248.254Oct 16 00:42:28 pkdns2 sshd\[52416\]: Failed password for invalid user xp from 182.75.248.254 port 36570 ssh2Oct 16 00:46:30 pkdns2 sshd\[52609\]: Address 182.75.248.254 maps to nsg-static-254.248.75.182-airtel.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 16 00:46:30 pkdns2 sshd\[52609\]: Invalid user pi from 182.75.248.254Oct 16 00:46:32 pkdns2 sshd\[52609\]: Failed password for invalid user pi from 182.75.248.254 port 45938 ssh2
...
2019-10-16 05:53:16
189.226.219.214 attack
82/tcp
[2019-10-15]1pkt
2019-10-16 05:17:25
129.205.138.174 attack
postfix (unknown user, SPF fail or relay access denied)
2019-10-16 05:51:48
188.64.131.189 attackbots
[portscan] Port scan
2019-10-16 05:42:57

Recently Reported IPs

202.199.225.195 156.225.225.69 12.220.96.90 131.139.196.188
170.211.164.47 190.246.69.87 187.209.34.12 173.58.159.150
88.255.73.105 84.1.156.0 217.147.1.183 104.111.219.79
156.157.164.105 103.45.79.221 2602:306:370d:eff0:c98f:e217:7cb0:2aca 220.32.13.156
186.214.236.162 108.237.87.170 193.28.227.36 20.19.249.247