Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.10.134.68 attackspam
Lines containing failures of 104.10.134.68
Nov 11 12:13:12 icinga sshd[18787]: Did not receive identification string from 104.10.134.68 port 35064
Nov 11 12:13:30 icinga sshd[18833]: Invalid user ryan from 104.10.134.68 port 37028
Nov 11 12:13:30 icinga sshd[18833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.10.134.68
Nov 11 12:13:32 icinga sshd[18833]: Failed password for invalid user ryan from 104.10.134.68 port 37028 ssh2
Nov 11 12:13:32 icinga sshd[18833]: Received disconnect from 104.10.134.68 port 37028:11: Bye Bye [preauth]
Nov 11 12:13:32 icinga sshd[18833]: Disconnected from invalid user ryan 104.10.134.68 port 37028 [preauth]
Nov 11 12:13:47 icinga sshd[18994]: Invalid user ftpuser from 104.10.134.68 port 38490
Nov 11 12:13:47 icinga sshd[18994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.10.134.68


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.10
2019-11-12 00:57:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.10.13.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.10.13.123.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 16:46:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
123.13.10.104.in-addr.arpa domain name pointer 104-10-13-123.lightspeed.wepbfl.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
123.13.10.104.in-addr.arpa	name = 104-10-13-123.lightspeed.wepbfl.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.219.44.156 attack
Unauthorized connection attempt from IP address 138.219.44.156 on Port 445(SMB)
2020-02-12 23:12:50
84.0.102.11 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-12 22:25:43
200.165.167.10 attack
Feb 12 04:43:53 hpm sshd\[19813\]: Invalid user eee from 200.165.167.10
Feb 12 04:43:53 hpm sshd\[19813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.165.167.10
Feb 12 04:43:55 hpm sshd\[19813\]: Failed password for invalid user eee from 200.165.167.10 port 39296 ssh2
Feb 12 04:47:43 hpm sshd\[20236\]: Invalid user pineapple from 200.165.167.10
Feb 12 04:47:43 hpm sshd\[20236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.165.167.10
2020-02-12 23:06:25
114.67.176.32 attackspambots
Feb 12 14:39:56 legacy sshd[32672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.176.32
Feb 12 14:39:57 legacy sshd[32672]: Failed password for invalid user speedy from 114.67.176.32 port 42134 ssh2
Feb 12 14:46:11 legacy sshd[553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.176.32
...
2020-02-12 22:58:13
40.117.236.207 attackbotsspam
Tried sshing with brute force.
2020-02-12 23:12:24
84.236.107.47 attackbots
Feb 12 14:59:26 legacy sshd[1284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.107.47
Feb 12 14:59:29 legacy sshd[1284]: Failed password for invalid user flora from 84.236.107.47 port 57136 ssh2
Feb 12 15:02:47 legacy sshd[1464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.107.47
...
2020-02-12 22:57:50
36.155.102.212 attack
Feb 12 11:31:21 vps46666688 sshd[29300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.102.212
Feb 12 11:31:23 vps46666688 sshd[29300]: Failed password for invalid user monitoring from 36.155.102.212 port 41300 ssh2
...
2020-02-12 23:04:02
197.45.89.114 attack
1581517389 - 02/12/2020 15:23:09 Host: 197.45.89.114/197.45.89.114 Port: 445 TCP Blocked
2020-02-12 22:37:18
190.205.110.194 attackspambots
Unauthorized connection attempt from IP address 190.205.110.194 on Port 445(SMB)
2020-02-12 23:02:23
218.92.0.178 attackspam
Feb 12 10:12:42 mail sshd\[21860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
...
2020-02-12 23:14:12
149.248.0.114 attack
SSH/22 MH Probe, BF, Hack -
2020-02-12 22:29:17
221.237.150.92 attackbotsspam
Unauthorized connection attempt from IP address 221.237.150.92 on Port 445(SMB)
2020-02-12 23:17:02
83.169.197.13 attackspambots
Unauthorized connection attempt from IP address 83.169.197.13 on Port 445(SMB)
2020-02-12 22:54:14
101.96.113.50 attack
Feb 12 04:43:29 hpm sshd\[19772\]: Invalid user martin from 101.96.113.50
Feb 12 04:43:29 hpm sshd\[19772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.113.50
Feb 12 04:43:31 hpm sshd\[19772\]: Failed password for invalid user martin from 101.96.113.50 port 58364 ssh2
Feb 12 04:47:32 hpm sshd\[20225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.113.50  user=root
Feb 12 04:47:33 hpm sshd\[20225\]: Failed password for root from 101.96.113.50 port 58946 ssh2
2020-02-12 22:58:35
124.156.55.143 attackbots
Unauthorized connection attempt detected from IP address 124.156.55.143 to port 1010
2020-02-12 22:22:14

Recently Reported IPs

65.164.246.79 157.52.215.185 221.205.231.156 56.23.22.41
9.204.107.60 61.173.253.77 153.28.151.68 127.98.44.207
57.196.49.235 220.114.99.220 153.187.23.22 108.104.80.206
41.11.32.55 23.241.177.170 141.162.73.101 134.67.136.39
145.62.150.73 251.139.225.170 160.214.152.13 13.66.5.195