Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.245.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.245.119.			IN	A

;; AUTHORITY SECTION:
.			97	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032502 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 26 07:14:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 119.245.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.245.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.168.156.212 attackspam
2019-12-14T05:45:11.777396shield sshd\[4096\]: Invalid user pub from 180.168.156.212 port 56034
2019-12-14T05:45:11.781866shield sshd\[4096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.156.212
2019-12-14T05:45:14.143692shield sshd\[4096\]: Failed password for invalid user pub from 180.168.156.212 port 56034 ssh2
2019-12-14T05:51:32.384729shield sshd\[5693\]: Invalid user lukacsko from 180.168.156.212 port 63991
2019-12-14T05:51:32.389116shield sshd\[5693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.156.212
2019-12-14 14:11:26
122.51.41.44 attackbotsspam
Dec 14 07:00:27 [host] sshd[4446]: Invalid user anni from 122.51.41.44
Dec 14 07:00:27 [host] sshd[4446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.41.44
Dec 14 07:00:29 [host] sshd[4446]: Failed password for invalid user anni from 122.51.41.44 port 41210 ssh2
2019-12-14 14:20:04
125.166.46.248 attackspam
Unauthorised access (Dec 14) SRC=125.166.46.248 LEN=52 TTL=248 ID=26253 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-14 14:23:37
103.74.239.110 attack
$f2bV_matches
2019-12-14 15:02:02
218.92.0.138 attackspam
Dec 14 03:46:19 firewall sshd[9846]: Failed password for root from 218.92.0.138 port 28658 ssh2
Dec 14 03:46:19 firewall sshd[9846]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 28658 ssh2 [preauth]
Dec 14 03:46:19 firewall sshd[9846]: Disconnecting: Too many authentication failures [preauth]
...
2019-12-14 14:49:56
96.114.71.146 attack
$f2bV_matches
2019-12-14 14:43:37
103.44.220.69 attack
103.44.220.69 - - [14/Dec/2019:04:55:00 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.44.220.69 - - [14/Dec/2019:04:55:03 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-14 14:14:08
210.245.26.142 attack
Dec 14 07:48:12 mc1 kernel: \[464922.099121\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=53137 PROTO=TCP SPT=56123 DPT=7809 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 14 07:51:58 mc1 kernel: \[465148.240033\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=21853 PROTO=TCP SPT=56123 DPT=7332 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 14 07:53:29 mc1 kernel: \[465239.068502\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=46527 PROTO=TCP SPT=56123 DPT=7572 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-14 14:58:29
182.232.39.111 attack
1576304991 - 12/14/2019 07:29:51 Host: 182.232.39.111/182.232.39.111 Port: 445 TCP Blocked
2019-12-14 14:54:42
112.85.42.171 attackspambots
ssh failed login
2019-12-14 14:21:55
218.92.0.134 attack
Dec 14 07:51:25 MK-Soft-Root2 sshd[21951]: Failed password for root from 218.92.0.134 port 60978 ssh2
Dec 14 07:51:30 MK-Soft-Root2 sshd[21951]: Failed password for root from 218.92.0.134 port 60978 ssh2
...
2019-12-14 14:55:46
157.230.86.37 attackspambots
IP blocked
2019-12-14 14:57:09
176.27.231.1 attackspambots
Dec 14 01:41:36 ny01 sshd[6108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.27.231.1
Dec 14 01:41:38 ny01 sshd[6108]: Failed password for invalid user jerome from 176.27.231.1 port 24460 ssh2
Dec 14 01:47:34 ny01 sshd[6769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.27.231.1
2019-12-14 14:54:08
51.15.194.51 attack
Dec 14 08:21:54 sauna sshd[65079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.194.51
Dec 14 08:21:56 sauna sshd[65079]: Failed password for invalid user guest from 51.15.194.51 port 44176 ssh2
...
2019-12-14 14:22:50
222.186.175.161 attack
Dec 14 07:15:55 dedicated sshd[21700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
Dec 14 07:15:57 dedicated sshd[21700]: Failed password for root from 222.186.175.161 port 23178 ssh2
2019-12-14 14:28:12

Recently Reported IPs

104.19.244.119 104.19.246.85 32.15.9.243 123.240.245.214
104.19.252.172 104.19.252.28 104.19.253.28 104.19.47.20
104.19.90.152 104.192.32.99 77.58.65.153 104.192.4.220
104.192.4.70 104.192.5.66 104.193.110.112 104.193.111.125
49.238.150.74 104.193.143.13 104.193.17.54 104.193.172.162