Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.138.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.138.73.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 15:43:17 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 73.138.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.138.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.126.187.229 attackbots
Unauthorized access detected from banned ip
2019-07-16 18:06:03
112.85.42.187 attackspam
2019-07-16T04:04:06.167532Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 112.85.42.187:43679 \(107.175.91.48:22\) \[session: 083a940c89d9\]
2019-07-16T04:05:08.439397Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 112.85.42.187:56102 \(107.175.91.48:22\) \[session: 88efd3974bb2\]
...
2019-07-16 18:27:30
81.241.157.172 attackbotsspam
...
2019-07-16 18:18:40
94.79.181.162 attackspambots
Jul 16 10:48:31 localhost sshd\[8610\]: Invalid user vince from 94.79.181.162 port 15812
Jul 16 10:48:31 localhost sshd\[8610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.79.181.162
...
2019-07-16 17:59:58
60.13.230.199 attackspam
Jul 14 16:25:34 vpxxxxxxx22308 sshd[9852]: Invalid user sftp from 60.13.230.199
Jul 14 16:25:34 vpxxxxxxx22308 sshd[9852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.13.230.199
Jul 14 16:25:36 vpxxxxxxx22308 sshd[9852]: Failed password for invalid user sftp from 60.13.230.199 port 49140 ssh2
Jul 14 16:31:10 vpxxxxxxx22308 sshd[10588]: Invalid user posp from 60.13.230.199
Jul 14 16:31:10 vpxxxxxxx22308 sshd[10588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.13.230.199

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=60.13.230.199
2019-07-16 18:11:26
206.189.197.48 attack
Jul 16 11:18:52 nginx sshd[5215]: Invalid user howard from 206.189.197.48
Jul 16 11:18:52 nginx sshd[5215]: Received disconnect from 206.189.197.48 port 33344:11: Normal Shutdown, Thank you for playing [preauth]
2019-07-16 17:46:57
104.238.116.19 attackbotsspam
Jul 16 11:38:29 ArkNodeAT sshd\[16126\]: Invalid user bruce from 104.238.116.19
Jul 16 11:38:29 ArkNodeAT sshd\[16126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.116.19
Jul 16 11:38:31 ArkNodeAT sshd\[16126\]: Failed password for invalid user bruce from 104.238.116.19 port 36998 ssh2
2019-07-16 18:32:46
93.67.24.133 attack
2019-07-16T01:27:41.459671abusebot-2.cloudsearch.cf sshd\[30930\]: Invalid user hg from 93.67.24.133 port 44890
2019-07-16 18:36:46
185.150.190.198 attackbots
Jul 16 11:48:36 cp sshd[20846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.150.190.198
Jul 16 11:48:38 cp sshd[20846]: Failed password for invalid user nexus from 185.150.190.198 port 48862 ssh2
Jul 16 11:54:32 cp sshd[24104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.150.190.198
2019-07-16 18:23:56
14.175.220.172 attackbotsspam
Unauthorised access (Jul 16) SRC=14.175.220.172 LEN=52 TTL=118 ID=26931 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-16 18:06:49
185.222.211.114 attack
CloudCIX Reconnaissance Scan Detected, PTR: hosting-by.nstorage.org.
2019-07-16 18:12:42
5.26.109.56 attack
Invalid user ggggg from 5.26.109.56 port 53791
2019-07-16 18:43:01
206.189.136.160 attackspam
Jul 16 11:53:52 core01 sshd\[23770\]: Invalid user virusalert from 206.189.136.160 port 39200
Jul 16 11:53:52 core01 sshd\[23770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.136.160
...
2019-07-16 18:15:00
36.66.149.211 attackspambots
Jul 16 10:47:51 mail sshd[22574]: Invalid user delgado from 36.66.149.211
...
2019-07-16 18:12:04
105.186.209.116 attackspambots
19/7/15@21:28:06: FAIL: Alarm-Intrusion address from=105.186.209.116
...
2019-07-16 18:21:14

Recently Reported IPs

104.19.140.73 104.19.137.72 104.19.11.106 104.19.142.101
104.19.141.73 104.19.143.101 104.19.15.99 104.19.20.44
104.19.246.30 104.19.2.142 104.19.23.187 104.19.22.96
104.19.16.201 104.19.19.117 104.19.27.78 104.19.26.149
104.19.33.248 104.19.247.30 104.19.4.77 104.19.43.152