Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.137.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.137.93.			IN	A

;; AUTHORITY SECTION:
.			111	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032502 1800 900 604800 86400

;; Query time: 174 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 26 07:03:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 93.137.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.137.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.255.86.106 attackbots
various attack
2020-08-31 06:34:57
118.25.74.199 attackspam
Aug 30 22:05:52 game-panel sshd[22961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.74.199  user=ftpuser
Aug 30 22:05:54 game-panel sshd[22961]: Failed password for invalid user ftpuser from 118.25.74.199 port 34682 ssh2
Aug 30 22:11:18 game-panel sshd[23284]: Failed password for root from 118.25.74.199 port 36468 ssh2
2020-08-31 06:50:35
51.195.63.199 attackspam
Brute forcing RDP port 3389
2020-08-31 06:44:42
81.68.137.119 attackbots
21886/tcp
[2020-08-30]1pkt
2020-08-31 06:59:02
122.116.203.31 attackspam
IP 122.116.203.31 attacked honeypot on port: 23 at 8/30/2020 1:35:25 PM
2020-08-31 07:04:22
88.155.154.55 attackbotsspam
trying to access non-authorized port
2020-08-31 06:58:39
45.143.223.47 attackspam
[2020-08-30 19:00:37] NOTICE[1185][C-00008aef] chan_sip.c: Call from '' (45.143.223.47:57575) to extension '900441904911046' rejected because extension not found in context 'public'.
[2020-08-30 19:00:37] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-30T19:00:37.560-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900441904911046",SessionID="0x7f10c4286a78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.223.47/57575",ACLName="no_extension_match"
[2020-08-30 19:00:53] NOTICE[1185][C-00008af1] chan_sip.c: Call from '' (45.143.223.47:51559) to extension '009441904911046' rejected because extension not found in context 'public'.
[2020-08-30 19:00:53] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-30T19:00:53.220-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="009441904911046",SessionID="0x7f10c416cce8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-08-31 07:09:05
124.171.47.84 attackbotsspam
Aug 30 22:35:50 vpn01 sshd[5570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.171.47.84
Aug 30 22:35:52 vpn01 sshd[5570]: Failed password for invalid user hqy from 124.171.47.84 port 40588 ssh2
...
2020-08-31 06:45:34
175.24.122.67 attackspam
6379/tcp
[2020-08-30]1pkt
2020-08-31 06:50:18
222.186.42.155 attack
Aug 30 16:05:45 dignus sshd[23423]: Failed password for root from 222.186.42.155 port 21736 ssh2
Aug 30 16:05:47 dignus sshd[23423]: Failed password for root from 222.186.42.155 port 21736 ssh2
Aug 30 16:05:49 dignus sshd[23459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Aug 30 16:05:50 dignus sshd[23459]: Failed password for root from 222.186.42.155 port 30399 ssh2
Aug 30 16:05:52 dignus sshd[23459]: Failed password for root from 222.186.42.155 port 30399 ssh2
...
2020-08-31 07:12:50
104.45.221.29 attack
Brute forcing email accounts
2020-08-31 06:57:17
212.70.149.4 attackspambots
2020-08-31T01:01:20.167735www postfix/smtpd[8789]: warning: unknown[212.70.149.4]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-31T01:04:30.481215www postfix/smtpd[8840]: warning: unknown[212.70.149.4]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-31T01:07:42.297120www postfix/smtpd[8840]: warning: unknown[212.70.149.4]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-31 07:11:00
124.95.171.244 attack
Aug 30 15:39:05 dignus sshd[20401]: Invalid user prueba from 124.95.171.244 port 44583
Aug 30 15:39:05 dignus sshd[20401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.95.171.244
Aug 30 15:39:06 dignus sshd[20401]: Failed password for invalid user prueba from 124.95.171.244 port 44583 ssh2
Aug 30 15:42:07 dignus sshd[20753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.95.171.244  user=root
Aug 30 15:42:09 dignus sshd[20753]: Failed password for root from 124.95.171.244 port 40057 ssh2
...
2020-08-31 06:52:58
106.12.60.107 attackspambots
(sshd) Failed SSH login from 106.12.60.107 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 30 18:51:58 server sshd[15020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.60.107  user=root
Aug 30 18:51:59 server sshd[15020]: Failed password for root from 106.12.60.107 port 51554 ssh2
Aug 30 18:58:32 server sshd[16705]: Invalid user orbit from 106.12.60.107 port 54172
Aug 30 18:58:34 server sshd[16705]: Failed password for invalid user orbit from 106.12.60.107 port 54172 ssh2
Aug 30 19:01:42 server sshd[17651]: Invalid user christa from 106.12.60.107 port 54938
2020-08-31 07:06:43
200.121.128.64 attackbotsspam
Automatic report - XMLRPC Attack
2020-08-31 06:33:42

Recently Reported IPs

104.16.137.19 104.16.138.19 104.16.138.93 104.16.143.88
104.16.144.88 104.16.151.45 104.16.152.45 104.16.160.191
80.36.135.71 104.16.167.76 104.16.168.76 104.16.183.83
104.16.183.92 104.16.184.92 104.16.185.230 104.16.188.59
225.60.196.90 104.16.19.100 104.16.19.102 104.16.19.103