IP: 104.47.34.228 United States Location: San Jose, California, United States
City:
San Jose
Region:
California
Country:
United States
Postal Code:
95141
Latitude:
37.3388
Longitude:
-121.8916
NetRange: 104.40.0.0 - 104.47.255.255
CIDR: 104.40.0.0/13
NetName: MSFT
NetHandle: NET-104-40-0-0-1
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Microsoft Corporation (MSFT)
RegDate: 2014-05-07
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/104.40.0.0

OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-10
Updated: 2023-11-17
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://rdap.arin.net/registry/entity/MSFT

OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/MRPD-ARIN

OrgTechHandle: SINGH683-ARIN
OrgTechName: Singh, Prachi
OrgTechPhone: +1-425-707-5601
OrgTechEmail: pracsin@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/SINGH683-ARIN

OrgTechHandle: IPHOS5-ARIN
OrgTechName: IPHostmaster, IPHostmaster
OrgTechPhone: +1-425-538-6637
OrgTechEmail: iphostmaster@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPHOS5-ARIN

OrgTechHandle: BEDAR6-ARIN
OrgTechName: Bedard, Dawn
OrgTechPhone: +1-425-538-6637
OrgTechEmail: dabedard@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/BEDAR6-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MAC74-ARIN

OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName: Chaturmohta, Somesh
OrgRoutingPhone: +1-425-882-8080
OrgRoutingEmail: someshch@microsoft.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CHATU3-ARIN
DNS BlackList results:
Most recent complaints on 104.47.34.228
Complaint by Don donny :

FBI CYBER SECURITY DEPARTMENT (ak76p@kitecu.one) SCAM WARNING! THIS EMAIL MESSAGE IS CLASSIFIED. THIS EMAIL IS SENT TO THE OWNER OF THIS EMAIL ADDRESS ONLY. SHARING OF THE CONTENT OF THIS EMAIL TO THIRD PARTY IS FORBIDDEN. Attention: Beneficiary of $28.85Million USD, This is to bring to your attention that we have obtained a classified document showing that you are dealing with scammers and impostors. We have tracked your transactions over the years and found out that you are dealing with scammers in Africa and all over the world. You are hereby warned, to put a stop to all your transactions with the under listed scammers/impostors; JANET YELLEN (IMPERSONATED) WILLARD ANIL TERRY WORD ANDREW WAYNE REV. MICHAEL LUCAS CLIFFORD CHANCE MARY MOHHAMED (IMPERSONATED) CHIEDOZIE PETER EGWUONWU EMEKA LAWRENCE ONUORAH EMMANUEL OKOYE GEORGE MOGHALU (IMPERSONATED) DAWSON SUSAN HON.CYNTHIA H. CLANTON (IMPERSONATED) EDITH VERMEILLE CHARLES JOHNSON JERRY MICHEAL WILLIAM OTUTUNZU PHILIPPE GIRIGISSOU (IMPERSONATED) REV. RAYMOND GODWIN ROLAND SMITH SANUSI LAMIDO SANUSI (IMPERSONATED) GLYNN BURGER (IMPERSONATED) JOHN EDWARD DAVID SCOTH MARK MORGAN CRISTINA MORENO (IMPERSONATED) BRIAN MOHNIHAN (IMPERSONATED) Rev. JERRY LEO JOHN BOOMA BONI YAYI (IMPERSONATED) BARAK OBAMA (IMPERSONATED) GODWIN EMEFIELE (IMPERSONATED) IBE KACHIKWU (IMPERSONATED) MOHAMMADU BUHARI (IMPERSONATED) BUKOLA SARAKI (IMPERSONATED) MICHELLE OBAMA (IMPERSONATED) SOLUDO CHARLES (IMPERSONATED) JACOBS BUMA MIKE IGWE CHRISTINE LAGARDE (IMPERSONATED) DAVID MARK (IMPERSONATED) BEN BERNANKE (IMPERSONATED) BAN KI-MOON (IMPERSONATED) WILLIAM CASTORO (IMPERSONATED) MOGENS LYKKETOFT (IMPERSONATED) JAMES COMEY (IMPERSONATED) JOHN O. BRENNAN (IMPERSONATED) JEH CHARLES JOHNSON (IMPERSONATED) MICHAEL J. FISHER (IMPERSONATED) Mrs Mireille Ballestrazzi (IMPERSONATED) And so many more organizations such as UNITED NATIONS, EUROPEAN UNION, IMF, Bank of AMERICA, JP Morgan Chase Bank, Wells Fargo Bank, Interpol, EFCC, World Bank, Barclays Bank, Royal Bank of Scotland, British High Commission E.T.C We are working round the clock to get hold of these individuals who in one way or the other, masterminds the use of banks, courier service and embassies while posing as the real persons to extort money from their victims. You are WARNED to STOP further communication either by phone or email to any of this person listed above or any other person posing as an agent. And we urge you to forward any email you receive to this office for verification and approval before you reply them. Whatever this message contains is for you alone DO NOT share or forward this mail to any individual, because all the persons on the list are being hunted and you must not reveal this to them otherwise it will make their apprehension difficult for us. Your payment files from different banks; NatWest Bank of London, Central Bank of Nigeria and Benin Republic, Bank of America Africa Development bank, UBA bank, E.T.C were compiled and submitted to my desk for review. The total sum owed you was sum up to the tune of $28,850,000.00 Twenty Eight Million Eight Hundred and Fifty Thousand United States Dollars. Now the funds had been lodged into the Federal Reserve Bank, while waiting for accreditation and transfer to your personal/private bank account in any part of the world. Meanwhile, after due scrutiny and verification, I confirmed that you have attempted to fulfilling all the necessary obligations that will enable the release of your payment. Unfortunately, your payment was not released to you due to flimsy excuses from the Bank officials in charge of your payment, because they have the intention of diverting your funds to their private accounts in order to satisfy their selfish interest. You are however lucky that we dictated their evil plans and therefore call for the submission of your payment files to us so we can personally handle the payment assignment to ensure that you receive your funds accordingly. Now all modalities regarding your funds release/transfer has been put in place here at the Reserve Bank, thus, your funds have been made ready for transfer in their sophisticated macro transfer system, so the only obligation you are to fulfill now in order to receive your $28,850,000.00 payment is to contact the federal reserve bank of St. Louis with your full details and request for transfer and pay the transfer charges of $285. During our meeting with bank officials it was agreed that the only charges to pay upfront in order to effect the transfer is $285 USD, so you are advice to work together with your payment officer to ensure successful completion of your funds transfer. You are to contact your payment officer at the Federal Reserve Bank of St. Louis account department by email with the below information and make sure you forward your information to them such as full name, address and direct telephone number. Kevin J. Shannon Payment officer email: kevin.shannonj@gmail.com Phone: 314-441-3661 Federal Reserve Bank of St. Louis One Federal Reserve Bank Plaza Broadway and Locust Streets St. Louis, Mo. 63102 You are strongly advised, to contact Federal Reserve with the above information and comply with them to ensure you receive your funds as scheduled. You are assured of the availability of your funds as soon as you contact and comply with them. Sent by FBI Cyber Security E-Scam Warning Department. FBI Headquarters 935 Pennsylvania Avenue, NW Washington, D.C. 20535-0001

Reported on: 20th, Sep. 2016

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 104.47.34.228 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.