Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.133.139.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.133.139.203.		IN	A

;; AUTHORITY SECTION:
.			228	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 09:32:31 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 203.139.133.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 203.139.133.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.243.136.230 attackspambots
Jul 28 00:20:26 rpi sshd[28512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.136.230 
Jul 28 00:20:28 rpi sshd[28512]: Failed password for invalid user mysql from 162.243.136.230 port 43752 ssh2
2019-07-28 07:00:55
50.100.31.49 attack
Invalid user rstudio from 50.100.31.49 port 49352
2019-07-28 07:15:58
201.230.55.55 attackbotsspam
Invalid user ubuntu from 201.230.55.55 port 51180
2019-07-28 06:55:06
187.112.251.65 attackbots
Invalid user user from 187.112.251.65 port 50763
2019-07-28 07:21:05
213.32.12.3 attackbotsspam
Invalid user rad from 213.32.12.3 port 55096
2019-07-28 07:18:20
45.248.133.36 attackbotsspam
Jul 28 00:27:46 host sshd\[52512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.133.36  user=root
Jul 28 00:27:49 host sshd\[52512\]: Failed password for root from 45.248.133.36 port 54500 ssh2
...
2019-07-28 06:49:50
138.68.92.121 attack
ssh default account attempted login
2019-07-28 07:03:50
203.195.178.83 attackspam
Invalid user squid from 203.195.178.83 port 50152
2019-07-28 07:18:42
61.183.35.44 attackspam
Invalid user julius from 61.183.35.44 port 37756
2019-07-28 06:47:22
68.183.83.82 attackbots
Jul 28 01:41:56 hosting sshd[9780]: Invalid user fake from 68.183.83.82 port 37846
Jul 28 01:41:56 hosting sshd[9780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.82
Jul 28 01:41:56 hosting sshd[9780]: Invalid user fake from 68.183.83.82 port 37846
Jul 28 01:41:58 hosting sshd[9780]: Failed password for invalid user fake from 68.183.83.82 port 37846 ssh2
...
2019-07-28 07:13:15
37.139.13.105 attackbots
Invalid user zimbra from 37.139.13.105 port 52718
2019-07-28 07:17:25
177.20.169.69 attackspambots
SSH-BruteForce
2019-07-28 07:24:42
138.68.171.25 attack
Invalid user butter from 138.68.171.25 port 35754
2019-07-28 07:03:21
190.201.21.74 attack
Invalid user pi from 190.201.21.74 port 37892
2019-07-28 06:57:22
104.131.93.33 attackbotsspam
2019-07-27T22:35:16.533296abusebot-6.cloudsearch.cf sshd\[31064\]: Invalid user nagios from 104.131.93.33 port 40833
2019-07-28 07:30:27

Recently Reported IPs

179.99.202.210 144.168.255.80 117.86.101.254 191.101.223.121
190.144.89.11 47.254.250.25 69.4.234.65 121.37.96.213
80.82.60.62 144.168.255.107 181.215.170.51 144.168.150.41
14.177.125.230 134.35.85.127 14.207.161.202 177.62.73.93
172.104.210.153 40.242.250.77 23.229.109.223 177.36.186.234