Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.104.106.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.104.106.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:26:57 CST 2025
;; MSG SIZE  rcvd: 105
Host info
8.106.104.92.in-addr.arpa domain name pointer 8.106.104.92.dynamic.cust.swisscom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.106.104.92.in-addr.arpa	name = 8.106.104.92.dynamic.cust.swisscom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.15.107.161 attackspam
[SYS2] ANY - Unused Port - Port=445 (1x)
2020-10-10 19:10:04
212.102.52.1 attackbots
PHP Info File Request - Possible PHP Version Scan
2020-10-10 19:12:24
183.6.100.56 attackspam
Unauthorized connection attempt from IP address 183.6.100.56 on Port 445(SMB)
2020-10-10 19:10:38
94.229.66.131 attack
SSH login attempts.
2020-10-10 19:11:17
36.67.241.20 attack
Unauthorized connection attempt from IP address 36.67.241.20 on Port 445(SMB)
2020-10-10 19:19:38
182.124.206.38 attackspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-10 19:09:14
186.91.32.211 attackbots
Oct 8 00:00:53 *hidden* sshd[14930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.91.32.211 Oct 8 00:00:55 *hidden* sshd[14930]: Failed password for invalid user guest from 186.91.32.211 port 50056 ssh2 Oct 8 00:01:00 *hidden* sshd[21247]: Invalid user nagios from 186.91.32.211 port 50982
2020-10-10 19:46:21
193.234.95.137 attack
Oct 7 08:00:50 *hidden* sshd[5942]: Failed password for invalid user admin from 193.234.95.137 port 33676 ssh2 Oct 8 01:01:45 *hidden* sshd[21521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.234.95.137 user=root Oct 8 01:01:47 *hidden* sshd[21521]: Failed password for *hidden* from 193.234.95.137 port 58064 ssh2
2020-10-10 19:12:07
193.112.70.95 attack
Brute-force attempt banned
2020-10-10 19:14:06
81.192.87.130 attack
2020-10-10T11:27:04.627665abusebot-7.cloudsearch.cf sshd[26931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=adsl-130-87-192-81.adsl2.iam.net.ma  user=root
2020-10-10T11:27:07.083605abusebot-7.cloudsearch.cf sshd[26931]: Failed password for root from 81.192.87.130 port 40376 ssh2
2020-10-10T11:30:34.500765abusebot-7.cloudsearch.cf sshd[26941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=adsl-130-87-192-81.adsl2.iam.net.ma  user=root
2020-10-10T11:30:36.545343abusebot-7.cloudsearch.cf sshd[26941]: Failed password for root from 81.192.87.130 port 13947 ssh2
2020-10-10T11:34:11.507768abusebot-7.cloudsearch.cf sshd[26945]: Invalid user samba from 81.192.87.130 port 44017
2020-10-10T11:34:11.515137abusebot-7.cloudsearch.cf sshd[26945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=adsl-130-87-192-81.adsl2.iam.net.ma
2020-10-10T11:34:11.507768abusebot-7.cloudsearc
...
2020-10-10 19:38:45
191.54.185.9 attack
Unauthorized connection attempt detected from IP address 191.54.185.9 to port 445 [T]
2020-10-10 19:06:49
222.240.169.12 attack
2020-10-10 05:51:29.001045-0500  localhost sshd[542]: Failed password for invalid user admin from 222.240.169.12 port 50398 ssh2
2020-10-10 19:08:21
35.203.68.135 attackbots
prod11
...
2020-10-10 19:27:56
177.62.180.180 attackbotsspam
Unauthorized connection attempt from IP address 177.62.180.180 on Port 445(SMB)
2020-10-10 19:23:38
191.193.171.13 attackspam
Unauthorized connection attempt detected from IP address 191.193.171.13 to port 23
2020-10-10 19:06:16

Recently Reported IPs

56.159.77.201 202.37.246.82 241.66.234.174 245.182.196.90
249.118.211.238 247.246.138.32 44.212.183.115 73.5.2.168
232.139.105.140 122.9.38.6 94.221.173.237 233.75.176.109
189.200.191.93 181.217.160.210 236.158.128.181 217.153.54.113
18.248.53.151 218.144.249.122 51.238.41.62 86.243.77.220