Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.56.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.56.218.			IN	A

;; AUTHORITY SECTION:
.			515	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032401 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 25 05:57:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 218.56.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 218.56.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.31.32.150 attackspambots
Sep 21 01:16:13 OPSO sshd\[8058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150  user=root
Sep 21 01:16:14 OPSO sshd\[8058\]: Failed password for root from 123.31.32.150 port 60226 ssh2
Sep 21 01:20:33 OPSO sshd\[8860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150  user=root
Sep 21 01:20:35 OPSO sshd\[8860\]: Failed password for root from 123.31.32.150 port 43062 ssh2
Sep 21 01:24:53 OPSO sshd\[9706\]: Invalid user ftptemp from 123.31.32.150 port 54130
Sep 21 01:24:53 OPSO sshd\[9706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
2020-09-21 07:32:13
182.148.122.11 attackspam
Unauthorized connection attempt from IP address 182.148.122.11 on Port 445(SMB)
2020-09-21 07:21:09
211.149.132.104 attackbotsspam
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=51363  .  dstport=2375  .     (2317)
2020-09-21 07:41:52
47.36.103.46 attackspambots
$f2bV_matches
2020-09-21 07:28:46
93.184.20.87 attack
Sep 20 14:01:05 logopedia-1vcpu-1gb-nyc1-01 sshd[442955]: Failed password for root from 93.184.20.87 port 37860 ssh2
...
2020-09-21 07:20:18
117.50.77.220 attackspam
invalid user student1 from 117.50.77.220 port 47456 ssh2
2020-09-21 07:29:52
118.25.91.168 attackspam
SSH Invalid Login
2020-09-21 07:33:04
1.64.232.79 attackbotsspam
Brute-force attempt banned
2020-09-21 07:07:46
111.252.35.122 attackbotsspam
Sep 20 14:01:15 logopedia-1vcpu-1gb-nyc1-01 sshd[442997]: Invalid user ubuntu from 111.252.35.122 port 38229
...
2020-09-21 07:09:38
83.150.212.108 attack
Unauthorized connection attempt from IP address 83.150.212.108 on Port 445(SMB)
2020-09-21 07:16:55
201.26.164.160 attack
Sep 20 14:00:52 logopedia-1vcpu-1gb-nyc1-01 sshd[442898]: Failed password for root from 201.26.164.160 port 40658 ssh2
...
2020-09-21 07:36:09
35.129.31.137 attackbots
Triggered by Fail2Ban at Ares web server
2020-09-21 07:19:10
170.249.54.106 attack
Brute-force attempt banned
2020-09-21 07:17:44
87.222.226.78 attack
Brute-force attempt banned
2020-09-21 07:43:14
178.134.136.170 attackspam
Unauthorized connection attempt from IP address 178.134.136.170 on Port 445(SMB)
2020-09-21 07:11:48

Recently Reported IPs

104.19.55.8 104.19.64.102 104.19.66.133 104.19.68.162
104.19.73.125 33.17.212.63 104.19.78.10 104.19.81.192
104.19.85.210 104.19.92.63 104.192.220.150 104.192.220.42
104.192.4.125 104.192.4.150 104.192.4.69 104.192.6.29
104.192.85.37 104.192.86.123 178.26.254.153 132.199.146.236