Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.157.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.157.53.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 14:08:02 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 53.157.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.157.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.165.172.80 attack
fell into ViewStateTrap:Durban01
2020-01-03 15:23:31
200.122.249.203 attackbots
...
2020-01-03 15:29:53
222.246.224.179 attackbots
CN China - Failures: 20 ftpd
2020-01-03 15:28:04
195.154.191.151 attack
SIP Bruteforce
2020-01-03 15:42:45
47.176.39.218 attackbots
Jan  3 08:07:33 mout sshd[17585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.176.39.218  user=root
Jan  3 08:07:35 mout sshd[17585]: Failed password for root from 47.176.39.218 port 23229 ssh2
2020-01-03 15:26:40
148.66.135.152 attack
Automatic report - XMLRPC Attack
2020-01-03 15:25:07
91.121.84.187 attackspam
2020-01-03 08:22:20 dovecot_login authenticator failed for ns301051.ip-91-121-84.eu \(ADMIN\) \[91.121.84.187\]: 535 Incorrect authentication data \(set_id=no-reply@nopcommerce.it\)
2020-01-03 08:22:37 dovecot_login authenticator failed for ns301051.ip-91-121-84.eu \(ADMIN\) \[91.121.84.187\]: 535 Incorrect authentication data \(set_id=no-reply@opso.it\)
2020-01-03 08:26:20 dovecot_login authenticator failed for ns301051.ip-91-121-84.eu \(ADMIN\) \[91.121.84.187\]: 535 Incorrect authentication data \(set_id=info@nopcommerce.it\)
2020-01-03 08:26:36 dovecot_login authenticator failed for ns301051.ip-91-121-84.eu \(ADMIN\) \[91.121.84.187\]: 535 Incorrect authentication data \(set_id=info@opso.it\)
2020-01-03 08:30:19 dovecot_login authenticator failed for ns301051.ip-91-121-84.eu \(ADMIN\) \[91.121.84.187\]: 535 Incorrect authentication data \(set_id=smtp@nopcommerce.it\)
2020-01-03 15:37:11
89.248.160.178 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 90 - port: 16001 proto: TCP cat: Misc Attack
2020-01-03 15:52:13
104.237.255.204 attackbots
Invalid user natalie from 104.237.255.204 port 47998
2020-01-03 15:49:03
157.230.239.99 attack
Invalid user fac from 157.230.239.99 port 59234
2020-01-03 15:15:59
119.29.242.48 attack
Invalid user sakshi from 119.29.242.48 port 37520
2020-01-03 15:51:50
104.152.52.21 attackbotsspam
Automatic report - Banned IP Access
2020-01-03 15:24:35
60.27.21.198 attackspambots
Unauthorized connection attempt detected from IP address 60.27.21.198 to port 23
2020-01-03 15:33:32
24.237.0.92 attackbots
failed_logins
2020-01-03 15:29:37
129.204.94.81 attackbotsspam
Jan  3 05:38:54 raspberrypi sshd\[30112\]: Invalid user applmgr from 129.204.94.81Jan  3 05:38:56 raspberrypi sshd\[30112\]: Failed password for invalid user applmgr from 129.204.94.81 port 56628 ssh2Jan  3 05:59:42 raspberrypi sshd\[30807\]: Invalid user new from 129.204.94.81
...
2020-01-03 15:51:26

Recently Reported IPs

104.19.158.3 104.19.161.69 104.19.159.3 104.19.169.77
104.19.173.58 104.19.180.3 104.19.174.207 104.19.181.3
104.19.179.24 104.19.222.47 104.17.91.72 104.19.22.125
104.19.160.69 104.19.223.47 104.19.224.18 104.19.229.9
104.19.245.33 104.19.233.2 104.19.232.2 104.19.246.33