Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.131.198.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.131.198.214.		IN	A

;; AUTHORITY SECTION:
.			181	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:13:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 214.198.131.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.198.131.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.39.221.67 attackbots
20/2/5@18:19:01: FAIL: Alarm-Network address from=190.39.221.67
20/2/5@18:19:01: FAIL: Alarm-Network address from=190.39.221.67
...
2020-02-06 08:32:50
77.42.90.11 attack
Automatic report - Port Scan Attack
2020-02-06 08:41:26
113.161.92.92 attackbots
2020-02-0523:22:571izT4S-0002AZ-Up\<=verena@rs-solution.chH=\(localhost\)[37.114.162.168]:59291P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2237id=BEBB0D5E5581AF1CC0C58C34C0A54DC1@rs-solution.chT="Youhappentobelookingfortruelove\?\,Anna"for15776692738@163.comfast_boy_with_fast_toys74@yahoo.com2020-02-0523:23:191izT4p-0002BP-9R\<=verena@rs-solution.chH=\(localhost\)[197.39.113.39]:54109P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2242id=3C398FDCD7032D9E42470EB6425352BD@rs-solution.chT="Youhappentobesearchingforreallove\?\,Anna"forjake.lovitt95@gmail.comclarencejrsmith@gmail.com2020-02-0523:21:341izT32-00026S-QK\<=verena@rs-solution.chH=\(localhost\)[190.182.179.12]:37377P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2194id=ACA91F4C4793BD0ED2D79E26D26001D1@rs-solution.chT="Onlyneedatinybitofyourattention\,Anna"forscottnyoung@gmail.commarcusshlb@gmail.com2020-02-0
2020-02-06 08:44:20
123.140.114.196 attackbotsspam
Feb  5 13:48:22 hpm sshd\[22223\]: Invalid user cxf from 123.140.114.196
Feb  5 13:48:22 hpm sshd\[22223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196
Feb  5 13:48:24 hpm sshd\[22223\]: Failed password for invalid user cxf from 123.140.114.196 port 34714 ssh2
Feb  5 13:52:05 hpm sshd\[22625\]: Invalid user avk from 123.140.114.196
Feb  5 13:52:05 hpm sshd\[22625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196
2020-02-06 08:12:16
117.34.200.242 attackbots
Feb  5 23:23:39 dcd-gentoo sshd[17178]: User root from 117.34.200.242 not allowed because none of user's groups are listed in AllowGroups
Feb  5 23:23:41 dcd-gentoo sshd[17183]: User root from 117.34.200.242 not allowed because none of user's groups are listed in AllowGroups
Feb  5 23:23:42 dcd-gentoo sshd[17187]: User root from 117.34.200.242 not allowed because none of user's groups are listed in AllowGroups
...
2020-02-06 08:34:46
46.38.144.215 attack
Feb  4 03:22:22 nirvana postfix/smtpd[7866]: connect from unknown[46.38.144.215]
Feb  4 03:22:22 nirvana postfix/smtpd[7866]: connect from unknown[46.38.144.215]
Feb  4 03:22:24 nirvana postfix/smtpd[7869]: connect from unknown[46.38.144.215]
Feb  4 03:22:24 nirvana postfix/smtpd[7869]: connect from unknown[46.38.144.215]
Feb  4 03:22:28 nirvana postfix/smtpd[7869]: warning: unknown[46.38.144.215]: SASL LOGIN authentication failed: authentication failure
Feb  4 03:22:28 nirvana postfix/smtpd[7869]: warning: unknown[46.38.144.215]: SASL LOGIN authentication failed: authentication failure
Feb  4 03:22:28 nirvana postfix/smtpd[7869]: disconnect from unknown[46.38.144.215]
Feb  4 03:22:28 nirvana postfix/smtpd[7869]: disconnect from unknown[46.38.144.215]
Feb  4 03:22:29 nirvana postfix/smtpd[7869]: connect from unknown[46.38.144.215]
Feb  4 03:22:29 nirvana postfix/smtpd[7869]: connect from unknown[46.38.144.215]
Feb  4 03:22:31 nirvana postfix/smtpd[7866]: warning: unknow........
-------------------------------
2020-02-06 08:27:34
173.245.202.74 attackspam
173.245.202.74 - - [05/Feb/2020:22:23:20 +0000] "POST /wp-login.php HTTP/1.1" 200 6256 "https://www.karma.net/wp-login.php" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10"
173.245.202.74 - - [05/Feb/2020:22:23:22 +0000] "POST /wp-login.php HTTP/1.1" 200 6269 "https://www.karma.net/wp-login.php" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10"
...
2020-02-06 08:47:11
98.109.26.245 attack
Unauthorized connection attempt detected from IP address 98.109.26.245 to port 2220 [J]
2020-02-06 08:41:04
195.49.186.210 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-02-06 08:01:29
183.48.90.118 attack
Unauthorized connection attempt detected from IP address 183.48.90.118 to port 2220 [J]
2020-02-06 08:46:39
14.248.83.163 attackspambots
Feb  6 00:17:31 legacy sshd[31293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.83.163
Feb  6 00:17:32 legacy sshd[31293]: Failed password for invalid user midnight from 14.248.83.163 port 53806 ssh2
Feb  6 00:21:09 legacy sshd[31547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.83.163
...
2020-02-06 08:11:33
203.152.166.183 attackbots
Feb  4 07:16:51 web02 sshd[24109]: Did not receive identification string from 203.152.166.183
Feb  4 08:57:18 web02 sshd[25363]: Invalid user plexuser from 203.152.166.183
Feb  4 08:57:18 web02 sshd[25363]: Connection closed by 203.152.166.183 [preauth]
Feb  4 08:57:20 web02 sshd[25365]: Invalid user pi from 203.152.166.183
Feb  4 08:57:20 web02 sshd[25365]: Connection closed by 203.152.166.183 [preauth]
Feb  4 08:57:21 web02 sshd[25367]: Invalid user pi from 203.152.166.183
Feb  4 08:57:21 web02 sshd[25367]: Connection closed by 203.152.166.183 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.152.166.183
2020-02-06 08:36:28
107.189.11.168 attackspambots
Feb  5 23:23:39 ks10 sshd[2664597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.11.168 
Feb  5 23:23:41 ks10 sshd[2664597]: Failed password for invalid user oeu from 107.189.11.168 port 41590 ssh2
...
2020-02-06 08:35:17
94.102.49.65 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 44499 proto: TCP cat: Misc Attack
2020-02-06 08:23:23
138.197.179.111 attackbots
Unauthorized connection attempt detected from IP address 138.197.179.111 to port 2220 [J]
2020-02-06 08:14:56

Recently Reported IPs

104.131.191.151 104.131.199.155 104.131.2.154 15.6.2.180
104.131.2.28 104.131.20.99 104.131.200.142 104.131.21.208
104.131.210.233 104.131.214.106 104.131.222.197 104.131.23.172
104.131.28.139 104.131.33.243 104.131.34.89 104.131.38.170
104.131.39.149 104.131.45.155 104.131.52.220 104.131.54.49