Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.138.242.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;75.138.242.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:23:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
104.242.138.75.in-addr.arpa domain name pointer syn-075-138-242-104.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.242.138.75.in-addr.arpa	name = syn-075-138-242-104.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.54.160.212 attack
firewall-block, port(s): 9439/tcp
2020-06-03 18:24:48
162.243.138.144 attackspambots
06/03/2020-06:02:27.033543 162.243.138.144 Protocol: 17 GPL SQL ping attempt
2020-06-03 18:32:45
61.136.184.75 attackbotsspam
Jun  3 10:35:37 vmi345603 sshd[21215]: Failed password for root from 61.136.184.75 port 59059 ssh2
...
2020-06-03 18:29:44
196.52.43.111 attackbots
873/tcp 3389/tcp 30303/tcp...
[2020-04-04/06-03]67pkt,44pt.(tcp),2pt.(udp),1tp.(icmp)
2020-06-03 18:31:40
174.94.61.126 attackspambots
Hits on port : 2375
2020-06-03 18:40:57
45.55.88.94 attackspambots
Jun  3 10:35:32 ns382633 sshd\[17613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94  user=root
Jun  3 10:35:34 ns382633 sshd\[17613\]: Failed password for root from 45.55.88.94 port 48768 ssh2
Jun  3 10:50:29 ns382633 sshd\[20524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94  user=root
Jun  3 10:50:31 ns382633 sshd\[20524\]: Failed password for root from 45.55.88.94 port 58118 ssh2
Jun  3 10:55:49 ns382633 sshd\[21404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94  user=root
2020-06-03 18:40:00
222.186.169.194 attack
SSH invalid-user multiple login attempts
2020-06-03 18:12:24
117.194.166.28 attack
2020-06-0305:44:091jgKJz-0000vA-L1\<=info@whatsup2013.chH=\(localhost\)[123.20.117.29]:55430P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3035id=aa3d8bd8d3f8d2da4643f559becae0fc5a2d45@whatsup2013.chT="topatrickcorbin737"forpatrickcorbin737@gmail.comangeito_96_tlv@hotmail.comsjdboy@gmail.com2020-06-0305:49:031jgKOk-0001HQ-GG\<=info@whatsup2013.chH=\(localhost\)[117.194.166.28]:51174P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3019id=a205b3e0ebc0eae27e7bcd6186f2d8c477819e@whatsup2013.chT="tobehtisata"forbehtisata@gmail.combudass69@gmail.compatrickg63@kprschools.ca2020-06-0305:45:521jgKLg-00015P-5m\<=info@whatsup2013.chH=\(localhost\)[220.164.2.87]:37479P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3002id=aa893f6c674c666ef2f741ed0a7e544839fb2b@whatsup2013.chT="towadsonp"forwadsonp@gmail.commehorny69@gmail.comvkphysique@hotmail.com2020-06-0305:44:411jgKKW-00010l-AX\<=info@w
2020-06-03 18:35:48
194.65.141.196 attack
Unauthorized connection attempt from IP address 194.65.141.196 on Port 445(SMB)
2020-06-03 18:36:26
37.49.226.249 attack
2020-06-03T12:06:20.648229sd-86998 sshd[15350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.249  user=root
2020-06-03T12:06:22.771486sd-86998 sshd[15350]: Failed password for root from 37.49.226.249 port 45802 ssh2
2020-06-03T12:06:29.175183sd-86998 sshd[15362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.249  user=root
2020-06-03T12:06:30.867870sd-86998 sshd[15362]: Failed password for root from 37.49.226.249 port 36250 ssh2
2020-06-03T12:06:37.692494sd-86998 sshd[15373]: Invalid user admin from 37.49.226.249 port 54884
...
2020-06-03 18:09:15
178.147.23.184 attackbotsspam
Unauthorized IMAP connection attempt
2020-06-03 18:29:00
107.170.204.148 attackbots
firewall-block, port(s): 10796/tcp
2020-06-03 18:24:04
52.186.121.199 attackspam
Website hacking attempt: Wordpress service [xmlrpc.php]
2020-06-03 18:08:56
35.246.146.161 attack
13 attempts against mh-misc-ban on pluto
2020-06-03 18:19:04
68.183.156.109 attackspam
Fail2Ban - SSH Bruteforce Attempt
2020-06-03 18:37:35

Recently Reported IPs

230.2.240.53 95.168.198.48 58.122.130.151 98.220.166.111
72.107.123.228 180.212.207.19 89.66.221.90 209.152.144.76
9.227.253.213 148.221.83.165 208.43.13.53 175.157.142.1
249.231.94.125 230.180.203.255 70.118.218.235 250.125.26.70
7.81.195.224 29.157.16.239 48.121.112.48 78.4.27.122