Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.134.5.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10659
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.134.5.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 03:25:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 103.5.134.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.5.134.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.105.139.113 attackspambots
firewall-block, port(s): 7547/tcp
2019-07-08 00:58:35
93.36.178.172 attackspam
Hit on /wp-login.php
2019-07-08 00:38:59
198.199.89.115 attackspambots
DATE:2019-07-07_15:41:08, IP:198.199.89.115, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-08 00:42:20
50.62.176.220 attackbots
xmlrpc attack
2019-07-08 01:00:46
80.211.114.236 attackspambots
Jul  7 16:00:07 Proxmox sshd\[32106\]: Invalid user cedric from 80.211.114.236 port 52388
Jul  7 16:00:07 Proxmox sshd\[32106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.114.236
Jul  7 16:00:09 Proxmox sshd\[32106\]: Failed password for invalid user cedric from 80.211.114.236 port 52388 ssh2
Jul  7 16:04:05 Proxmox sshd\[3850\]: Invalid user www from 80.211.114.236 port 46267
Jul  7 16:04:05 Proxmox sshd\[3850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.114.236
Jul  7 16:04:07 Proxmox sshd\[3850\]: Failed password for invalid user www from 80.211.114.236 port 46267 ssh2
2019-07-08 00:45:10
79.137.84.144 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-08 00:31:16
191.53.199.67 attack
failed_logins
2019-07-08 00:54:27
159.203.176.104 attackspambots
RDPBrutePLe
2019-07-08 01:07:29
188.166.229.205 attack
Jul  7 16:49:03 srv-4 sshd\[17057\]: Invalid user agent from 188.166.229.205
Jul  7 16:49:03 srv-4 sshd\[17057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.229.205
Jul  7 16:49:05 srv-4 sshd\[17057\]: Failed password for invalid user agent from 188.166.229.205 port 15511 ssh2
...
2019-07-08 00:20:50
163.179.32.136 attack
Banned for posting to wp-login.php without referer {"pwd":"admin","log":"admin","wp-submit":"Log In","testcookie":"1","redirect_to":"http:\/\/erindonlan.info\/wp-admin\/theme-install.php"}
2019-07-08 01:09:21
200.116.173.38 attackbots
Jul  7 16:12:43 dedicated sshd[32273]: Invalid user ali from 200.116.173.38 port 38312
Jul  7 16:12:43 dedicated sshd[32273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.173.38
Jul  7 16:12:43 dedicated sshd[32273]: Invalid user ali from 200.116.173.38 port 38312
Jul  7 16:12:45 dedicated sshd[32273]: Failed password for invalid user ali from 200.116.173.38 port 38312 ssh2
Jul  7 16:15:20 dedicated sshd[32510]: Invalid user angus from 200.116.173.38 port 63762
2019-07-08 00:28:25
142.93.202.122 attackbots
WordPress wp-login brute force :: 142.93.202.122 0.060 BYPASS [08/Jul/2019:01:57:04  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-08 00:26:51
191.240.24.164 attack
failed_logins
2019-07-08 00:48:35
70.35.207.236 attackspam
Searching for tar.gz files
GET  /[domainname]+2019.tar.gz
2019-07-08 00:41:35
141.98.9.2 attackspam
Jul  7 18:16:38 mail postfix/smtpd\[16289\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 18:18:08 mail postfix/smtpd\[18977\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 18:19:38 mail postfix/smtpd\[16288\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-08 00:24:11

Recently Reported IPs

3.131.92.250 44.108.130.249 77.110.89.89 243.188.101.114
2.124.154.29 128.182.67.202 82.44.198.242 188.80.235.68
80.53.65.138 91.107.218.23 252.208.48.53 179.171.225.99
147.75.92.174 128.199.28.243 4.239.94.116 171.55.48.156
96.192.136.167 69.100.241.253 239.122.233.231 13.220.142.208