Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.136.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54333
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.136.100.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:56:58 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 100.136.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.136.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.118.95 attackspambots
2019-11-07T08:38:12.695585abusebot-5.cloudsearch.cf sshd\[17676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.118.95  user=root
2019-11-07 17:25:45
124.109.41.97 attackbotsspam
until 2019-11-06T21:38:27+00:00, observations: 2, bad account names: 1
2019-11-07 17:51:44
78.128.113.120 attack
Nov  7 08:53:34 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:53:35 heicom postfix/smtpd\[5146\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:55:07 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:55:09 heicom postfix/smtpd\[5146\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 09:18:05 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
...
2019-11-07 17:21:28
203.195.201.129 attackbotsspam
Nov  7 04:08:58 h2570396 sshd[8925]: Failed password for invalid user demo from 203.195.201.129 port 35640 ssh2
Nov  7 04:08:59 h2570396 sshd[8925]: Received disconnect from 203.195.201.129: 11: Bye Bye [preauth]
Nov  7 04:28:23 h2570396 sshd[9346]: Failed password for invalid user wildfly from 203.195.201.129 port 58672 ssh2
Nov  7 04:28:24 h2570396 sshd[9346]: Received disconnect from 203.195.201.129: 11: Bye Bye [preauth]
Nov  7 04:32:22 h2570396 sshd[9459]: Failed password for invalid user tamonash from 203.195.201.129 port 36748 ssh2
Nov  7 04:32:22 h2570396 sshd[9459]: Received disconnect from 203.195.201.129: 11: Bye Bye [preauth]
Nov  7 04:36:16 h2570396 sshd[9548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.201.129  user=r.r
Nov  7 04:36:18 h2570396 sshd[9548]: Failed password for r.r from 203.195.201.129 port 43056 ssh2
Nov  7 04:36:18 h2570396 sshd[9548]: Received disconnect from 203.195.201.129: 11: Bye By........
-------------------------------
2019-11-07 17:18:15
146.88.240.4 attackspam
07.11.2019 08:59:24 Connection to port 27017 blocked by firewall
2019-11-07 17:16:47
174.138.19.114 attack
Nov  7 07:46:49 game-panel sshd[4483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.19.114
Nov  7 07:46:51 game-panel sshd[4483]: Failed password for invalid user raluca from 174.138.19.114 port 58736 ssh2
Nov  7 07:51:10 game-panel sshd[4597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.19.114
2019-11-07 17:38:44
201.174.182.159 attackbotsspam
SSH invalid-user multiple login attempts
2019-11-07 17:29:53
222.252.94.108 attack
Nov  7 09:59:11 pornomens sshd\[13735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.94.108  user=root
Nov  7 09:59:13 pornomens sshd\[13735\]: Failed password for root from 222.252.94.108 port 35798 ssh2
Nov  7 10:24:42 pornomens sshd\[13795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.94.108  user=root
...
2019-11-07 17:45:28
223.223.188.226 attackspambots
Nov  7 06:55:33 server6 sshd[15469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 06:55:35 server6 sshd[15469]: Failed password for r.r from 223.223.188.226 port 57238 ssh2
Nov  7 06:55:35 server6 sshd[15469]: Received disconnect from 223.223.188.226: 11: Bye Bye [preauth]
Nov  7 07:14:19 server6 sshd[30709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 07:14:21 server6 sshd[30709]: Failed password for r.r from 223.223.188.226 port 48913 ssh2
Nov  7 07:14:22 server6 sshd[30709]: Received disconnect from 223.223.188.226: 11: Bye Bye [preauth]
Nov  7 07:19:44 server6 sshd[2484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 07:19:46 server6 sshd[2484]: Failed password for r.r from 223.223.188.226 port 39988 ssh2
Nov  7 07:19:46 server6 sshd[2484]: R........
-------------------------------
2019-11-07 17:19:48
148.70.223.115 attackspam
5x Failed Password
2019-11-07 17:43:02
51.158.113.194 attack
Nov  7 08:16:22 DAAP sshd[22339]: Invalid user ubuntu from 51.158.113.194 port 54166
Nov  7 08:16:22 DAAP sshd[22339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.113.194
Nov  7 08:16:22 DAAP sshd[22339]: Invalid user ubuntu from 51.158.113.194 port 54166
Nov  7 08:16:24 DAAP sshd[22339]: Failed password for invalid user ubuntu from 51.158.113.194 port 54166 ssh2
Nov  7 08:22:14 DAAP sshd[22393]: Invalid user production from 51.158.113.194 port 54170
...
2019-11-07 17:40:12
186.53.183.243 attack
23/tcp
[2019-11-07]1pkt
2019-11-07 17:50:39
34.92.181.124 attackbotsspam
until 2019-11-07T00:30:52+00:00, observations: 2, bad account names: 0
2019-11-07 17:52:03
181.110.240.194 attackbotsspam
Nov  7 10:01:02 localhost sshd\[15167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.110.240.194  user=root
Nov  7 10:01:04 localhost sshd\[15167\]: Failed password for root from 181.110.240.194 port 38496 ssh2
Nov  7 10:08:09 localhost sshd\[15864\]: Invalid user administrator from 181.110.240.194 port 48416
Nov  7 10:08:09 localhost sshd\[15864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.110.240.194
2019-11-07 17:30:14
196.29.99.2 attackbots
2019-11-07T07:26:09.013176struts4.enskede.local sshd\[15798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
2019-11-07T07:26:12.066802struts4.enskede.local sshd\[15798\]: Failed password for root from 196.29.99.2 port 42852 ssh2
2019-11-07T07:26:13.947130struts4.enskede.local sshd\[15801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
2019-11-07T07:26:16.533608struts4.enskede.local sshd\[15801\]: Failed password for root from 196.29.99.2 port 44452 ssh2
2019-11-07T07:26:18.382036struts4.enskede.local sshd\[15804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
...
2019-11-07 17:14:11

Recently Reported IPs

104.19.135.75 104.19.136.90 104.19.134.75 104.19.136.75
104.19.137.100 104.19.138.104 104.19.137.75 104.19.138.75
104.19.137.90 104.21.65.97 104.19.139.104 104.19.139.75
104.19.139.77 104.19.138.77 104.19.141.75 104.19.141.77
104.19.140.75 104.19.140.77 104.19.142.100 104.19.142.77