Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clifton

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.131.27.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.131.27.109.			IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052200 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 22 22:27:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 109.27.131.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.27.131.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.55.39.136 attackbots
Automatic report - Banned IP Access
2020-09-24 03:18:07
118.89.245.202 attackbotsspam
Sep 23 09:06:46 lanister sshd[29884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.245.202
Sep 23 09:06:46 lanister sshd[29884]: Invalid user oracle from 118.89.245.202
Sep 23 09:06:48 lanister sshd[29884]: Failed password for invalid user oracle from 118.89.245.202 port 43064 ssh2
Sep 23 09:12:21 lanister sshd[29996]: Invalid user dm from 118.89.245.202
2020-09-24 03:18:25
60.190.252.21 attack
Auto Detect Rule!
proto TCP (SYN), 60.190.252.21:63034->gjan.info:1433, len 48
2020-09-24 03:07:05
200.88.48.99 attackbotsspam
Invalid user ftpuser from 200.88.48.99 port 40808
2020-09-24 03:00:18
106.12.36.42 attackspam
Sep 22 04:53:11 serwer sshd\[17912\]: Invalid user j from 106.12.36.42 port 51512
Sep 22 04:53:11 serwer sshd\[17912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.42
Sep 22 04:53:13 serwer sshd\[17912\]: Failed password for invalid user j from 106.12.36.42 port 51512 ssh2
...
2020-09-24 03:13:12
190.142.106.9 attack
Sep 23 15:36:16 ssh2 sshd[13941]: Invalid user user from 190.142.106.9 port 42950
Sep 23 15:36:16 ssh2 sshd[13941]: Failed password for invalid user user from 190.142.106.9 port 42950 ssh2
Sep 23 15:36:20 ssh2 sshd[13941]: Connection closed by invalid user user 190.142.106.9 port 42950 [preauth]
...
2020-09-24 02:59:27
14.240.248.215 attack
Unauthorized connection attempt from IP address 14.240.248.215 on Port 445(SMB)
2020-09-24 02:52:15
116.74.249.30 attackspam
Listed on    dnsbl-sorbs plus abuseat.org and zen-spamhaus   / proto=6  .  srcport=48218  .  dstport=1023  .     (3048)
2020-09-24 03:18:43
103.71.40.110 attack
Sep 23 04:53:33 web9 sshd\[14637\]: Invalid user exx from 103.71.40.110
Sep 23 04:53:33 web9 sshd\[14637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.71.40.110
Sep 23 04:53:35 web9 sshd\[14637\]: Failed password for invalid user exx from 103.71.40.110 port 47958 ssh2
Sep 23 04:55:42 web9 sshd\[14948\]: Invalid user ding from 103.71.40.110
Sep 23 04:55:42 web9 sshd\[14948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.71.40.110
2020-09-24 03:04:30
185.39.10.89 attackbots
Port scan on 7 port(s): 19027 19054 19527 19623 19626 19833 19928
2020-09-24 03:01:24
112.66.180.119 attackspambots
Auto Detect Rule!
proto TCP (SYN), 112.66.180.119:61070->gjan.info:1433, len 52
2020-09-24 03:04:13
116.75.214.251 attackspambots
DATE:2020-09-22 18:58:43, IP:116.75.214.251, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-24 02:51:43
37.49.225.159 attack
Brute forcing email accounts
2020-09-24 03:05:30
95.163.195.60 attackspambots
Invalid user iptv from 95.163.195.60 port 46838
2020-09-24 03:19:34
150.109.151.206 attackbotsspam
20 attempts against mh-ssh on pcx
2020-09-24 03:22:24

Recently Reported IPs

104.131.23.51 104.131.28.218 104.131.38.100 104.131.39.153
104.131.4.220 104.131.40.209 104.131.41.89 104.131.45.207
104.131.46.37 104.131.48.149 104.131.53.127 104.131.56.83
104.131.59.46 104.131.67.221 104.131.67.4 104.131.67.83
104.131.7.119 104.131.72.142 62.58.173.103 104.131.73.215