Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.131.184.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.131.184.50.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 14:05:35 CST 2022
;; MSG SIZE  rcvd: 107
Host info
50.184.131.104.in-addr.arpa domain name pointer lampshadepro.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.184.131.104.in-addr.arpa	name = lampshadepro.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.119.212.93 attackspambots
(mod_security) mod_security (id:20000005) triggered by 45.119.212.93 (VN/Vietnam/-): 5 in the last 300 secs
2020-04-04 18:24:50
80.95.211.130 attackspam
<6 unauthorized SSH connections
2020-04-04 18:50:21
84.192.181.105 attackspam
SSH auth scanning - multiple failed logins
2020-04-04 18:27:33
49.205.181.8 attackbotsspam
Port probing on unauthorized port 26
2020-04-04 19:02:21
61.74.118.139 attackspambots
Attempted connection to port 22.
2020-04-04 19:10:19
198.143.180.182 attackspambots
<6 unauthorized SSH connections
2020-04-04 18:28:35
200.206.145.124 attackbotsspam
" "
2020-04-04 18:29:48
109.70.100.19 attackspambots
MLV GET /wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
2020-04-04 18:18:02
91.121.135.79 attackspambots
Brute force attempts on SSH.
2020-04-04 18:56:54
111.59.100.243 attackspam
(sshd) Failed SSH login from 111.59.100.243 (CN/China/-): 5 in the last 3600 secs
2020-04-04 18:28:56
115.79.243.29 attackbotsspam
20/4/3@23:52:27: FAIL: Alarm-Network address from=115.79.243.29
...
2020-04-04 19:01:50
133.130.89.210 attack
Apr  4 05:50:38 Tower sshd[37521]: Connection from 133.130.89.210 port 44554 on 192.168.10.220 port 22 rdomain ""
Apr  4 05:50:42 Tower sshd[37521]: Failed password for root from 133.130.89.210 port 44554 ssh2
Apr  4 05:50:43 Tower sshd[37521]: Received disconnect from 133.130.89.210 port 44554:11: Bye Bye [preauth]
Apr  4 05:50:43 Tower sshd[37521]: Disconnected from authenticating user root 133.130.89.210 port 44554 [preauth]
2020-04-04 18:45:59
45.125.65.42 attackbotsspam
Apr  4 11:58:38 srv01 postfix/smtpd\[26960\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  4 12:00:21 srv01 postfix/smtpd\[26960\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  4 12:00:47 srv01 postfix/smtpd\[26960\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  4 12:00:57 srv01 postfix/smtpd\[26213\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  4 12:15:15 srv01 postfix/smtpd\[2538\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-04 18:37:14
117.121.38.200 attackspam
SSH/22 MH Probe, BF, Hack -
2020-04-04 18:35:59
86.12.245.187 attack
20/4/3@23:52:21: FAIL: Alarm-Telnet address from=86.12.245.187
...
2020-04-04 19:06:33

Recently Reported IPs

104.131.17.215 104.131.18.240 104.131.184.218 104.131.188.4
104.131.187.79 104.131.186.38 104.131.22.82 104.131.222.15
104.131.192.15 104.131.21.109 104.131.20.50 104.131.25.162
104.149.62.183 104.131.27.19 104.131.23.205 104.131.251.61
104.131.45.179 104.131.43.195 104.131.27.22 104.131.47.82