Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.219.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.219.130.			IN	A

;; AUTHORITY SECTION:
.			151	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 18:22:10 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 130.219.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.219.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.92.241.185 attack
20/1/3@23:53:46: FAIL: Alarm-Network address from=59.92.241.185
...
2020-01-04 15:08:14
106.54.141.8 attackspam
Jan  4 07:31:12 server sshd\[13882\]: Invalid user ts from 106.54.141.8
Jan  4 07:31:12 server sshd\[13882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.8 
Jan  4 07:31:14 server sshd\[13882\]: Failed password for invalid user ts from 106.54.141.8 port 41784 ssh2
Jan  4 07:53:51 server sshd\[18781\]: Invalid user steamuser from 106.54.141.8
Jan  4 07:53:51 server sshd\[18781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.8 
...
2020-01-04 15:04:43
54.37.158.218 attackspambots
Jan  4 04:53:55 marvibiene sshd[50627]: Invalid user marketing from 54.37.158.218 port 57362
Jan  4 04:53:55 marvibiene sshd[50627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.158.218
Jan  4 04:53:55 marvibiene sshd[50627]: Invalid user marketing from 54.37.158.218 port 57362
Jan  4 04:53:57 marvibiene sshd[50627]: Failed password for invalid user marketing from 54.37.158.218 port 57362 ssh2
...
2020-01-04 15:02:03
218.92.0.158 attackbotsspam
(sshd) Failed SSH login from 218.92.0.158 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan  4 08:06:39 blur sshd[24768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Jan  4 08:06:41 blur sshd[24768]: Failed password for root from 218.92.0.158 port 50590 ssh2
Jan  4 08:06:45 blur sshd[24768]: Failed password for root from 218.92.0.158 port 50590 ssh2
Jan  4 08:06:48 blur sshd[24768]: Failed password for root from 218.92.0.158 port 50590 ssh2
Jan  4 08:06:51 blur sshd[24768]: Failed password for root from 218.92.0.158 port 50590 ssh2
2020-01-04 15:10:39
75.40.137.234 attack
Jan  4 07:54:34 server sshd\[18893\]: Invalid user pi from 75.40.137.234
Jan  4 07:54:34 server sshd\[18895\]: Invalid user pi from 75.40.137.234
Jan  4 07:54:34 server sshd\[18893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=adsl-75-40-137-234.dsl.wlfrct.sbcglobal.net 
Jan  4 07:54:34 server sshd\[18895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=adsl-75-40-137-234.dsl.wlfrct.sbcglobal.net 
Jan  4 07:54:36 server sshd\[18893\]: Failed password for invalid user pi from 75.40.137.234 port 48906 ssh2
...
2020-01-04 14:41:16
51.161.12.231 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 44 - port: 8545 proto: TCP cat: Misc Attack
2020-01-04 15:12:04
84.201.162.151 attackspambots
Jan  4 07:48:57 vps sshd\[23821\]: Invalid user ftpuser from 84.201.162.151
Jan  4 07:49:43 vps sshd\[23824\]: Invalid user ubuntu from 84.201.162.151
...
2020-01-04 14:55:04
61.155.2.2 attackbotsspam
Jan  4 05:34:53 ns392434 sshd[8944]: Invalid user uyi from 61.155.2.2 port 37354
Jan  4 05:34:53 ns392434 sshd[8944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.155.2.2
Jan  4 05:34:53 ns392434 sshd[8944]: Invalid user uyi from 61.155.2.2 port 37354
Jan  4 05:34:54 ns392434 sshd[8944]: Failed password for invalid user uyi from 61.155.2.2 port 37354 ssh2
Jan  4 05:45:22 ns392434 sshd[9225]: Invalid user ramakiri from 61.155.2.2 port 45806
Jan  4 05:45:22 ns392434 sshd[9225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.155.2.2
Jan  4 05:45:22 ns392434 sshd[9225]: Invalid user ramakiri from 61.155.2.2 port 45806
Jan  4 05:45:24 ns392434 sshd[9225]: Failed password for invalid user ramakiri from 61.155.2.2 port 45806 ssh2
Jan  4 05:53:36 ns392434 sshd[9317]: Invalid user nj from 61.155.2.2 port 39522
2020-01-04 15:15:54
124.61.206.234 attack
Jan  4 05:53:46 v22018076622670303 sshd\[15274\]: Invalid user rator from 124.61.206.234 port 36026
Jan  4 05:53:46 v22018076622670303 sshd\[15274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.61.206.234
Jan  4 05:53:48 v22018076622670303 sshd\[15274\]: Failed password for invalid user rator from 124.61.206.234 port 36026 ssh2
...
2020-01-04 15:07:05
218.92.0.168 attackspam
Jan  4 07:51:38 srv206 sshd[5263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
Jan  4 07:51:40 srv206 sshd[5263]: Failed password for root from 218.92.0.168 port 12493 ssh2
...
2020-01-04 14:57:23
151.80.254.73 attackspam
Jan  3 19:53:05 web9 sshd\[20357\]: Invalid user musicbot from 151.80.254.73
Jan  3 19:53:05 web9 sshd\[20357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.73
Jan  3 19:53:07 web9 sshd\[20357\]: Failed password for invalid user musicbot from 151.80.254.73 port 33920 ssh2
Jan  3 19:56:29 web9 sshd\[20910\]: Invalid user user from 151.80.254.73
Jan  3 19:56:29 web9 sshd\[20910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.73
2020-01-04 15:06:47
37.139.0.226 attack
Invalid user plotkin from 37.139.0.226 port 35636
2020-01-04 14:58:59
122.155.174.34 attackspam
Jan  4 02:56:12 firewall sshd[11816]: Invalid user cron from 122.155.174.34
Jan  4 02:56:15 firewall sshd[11816]: Failed password for invalid user cron from 122.155.174.34 port 50244 ssh2
Jan  4 02:59:09 firewall sshd[11872]: Invalid user andy from 122.155.174.34
...
2020-01-04 14:48:19
49.235.177.93 attackbots
ssh failed login
2020-01-04 15:16:11
107.6.183.226 attackbotsspam
Unauthorized access detected from banned ip
2020-01-04 14:53:59

Recently Reported IPs

104.19.218.130 104.19.219.14 104.19.219.30 186.62.61.73
104.19.219.72 104.19.220.132 104.19.220.14 104.19.220.30
104.19.220.72 104.19.221.132 104.19.221.38 104.19.222.106
104.19.222.132 104.19.222.38 104.19.223.106 104.19.223.132
104.19.223.91 104.19.229.122 104.19.229.51 104.19.229.91