Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.196.136.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.196.136.83.			IN	A

;; AUTHORITY SECTION:
.			231	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:34:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
83.136.196.104.in-addr.arpa domain name pointer 83.136.196.104.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.136.196.104.in-addr.arpa	name = 83.136.196.104.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
179.107.111.106 attackspam
Mar  8 04:25:38 NPSTNNYC01T sshd[6477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.107.111.106
Mar  8 04:25:39 NPSTNNYC01T sshd[6477]: Failed password for invalid user localhost from 179.107.111.106 port 55978 ssh2
Mar  8 04:29:02 NPSTNNYC01T sshd[6633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.107.111.106
...
2020-03-08 17:03:33
114.39.134.24 attackspam
Automatic report - Port Scan Attack
2020-03-08 17:10:49
218.76.140.201 attackspambots
port
2020-03-08 16:42:47
111.229.144.67 attackbotsspam
detected by Fail2Ban
2020-03-08 17:14:07
157.230.190.90 attackbotsspam
Mar  7 21:49:38 wbs sshd\[17129\]: Invalid user testftp from 157.230.190.90
Mar  7 21:49:38 wbs sshd\[17129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.90
Mar  7 21:49:40 wbs sshd\[17129\]: Failed password for invalid user testftp from 157.230.190.90 port 45520 ssh2
Mar  7 21:58:31 wbs sshd\[17854\]: Invalid user vps from 157.230.190.90
Mar  7 21:58:31 wbs sshd\[17854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.90
2020-03-08 16:50:05
110.185.172.204 attack
Mar  8 08:48:18 hcbbdb sshd\[7236\]: Invalid user uploadu from 110.185.172.204
Mar  8 08:48:18 hcbbdb sshd\[7236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.172.204
Mar  8 08:48:20 hcbbdb sshd\[7236\]: Failed password for invalid user uploadu from 110.185.172.204 port 50560 ssh2
Mar  8 08:52:40 hcbbdb sshd\[7680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.172.204  user=root
Mar  8 08:52:43 hcbbdb sshd\[7680\]: Failed password for root from 110.185.172.204 port 45168 ssh2
2020-03-08 17:08:11
119.29.121.229 attackspambots
Mar  8 13:44:55 gw1 sshd[27168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.121.229
Mar  8 13:44:57 gw1 sshd[27168]: Failed password for invalid user angelo from 119.29.121.229 port 47440 ssh2
...
2020-03-08 16:52:05
93.126.34.236 attack
Automatic report - Port Scan Attack
2020-03-08 17:28:07
50.70.229.239 attackbotsspam
Mar  8 05:49:22 minden010 sshd[7355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.70.229.239
Mar  8 05:49:24 minden010 sshd[7355]: Failed password for invalid user hduser from 50.70.229.239 port 52138 ssh2
Mar  8 05:53:58 minden010 sshd[7856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.70.229.239
...
2020-03-08 17:01:28
220.133.36.112 attackbotsspam
Mar  4 04:32:42 vayu sshd[880484]: Invalid user tomcat from 220.133.36.112
Mar  4 04:32:42 vayu sshd[880484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-133-36-112.hinet-ip.hinet.net 
Mar  4 04:32:43 vayu sshd[880484]: Failed password for invalid user tomcat from 220.133.36.112 port 50296 ssh2
Mar  4 04:32:43 vayu sshd[880484]: Received disconnect from 220.133.36.112: 11: Bye Bye [preauth]
Mar  4 04:36:28 vayu sshd[883345]: Invalid user sshvpn from 220.133.36.112
Mar  4 04:36:29 vayu sshd[883345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-133-36-112.hinet-ip.hinet.net 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=220.133.36.112
2020-03-08 17:05:08
185.126.130.187 attackspam
Honeypot attack, port: 445, PTR: 187.130.126.185.right-net.
2020-03-08 17:01:10
94.25.173.243 attackbotsspam
Honeypot attack, port: 139, PTR: client.yota.ru.
2020-03-08 16:55:10
34.206.188.3 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-08 17:26:15
175.24.109.20 attack
Mar  7 21:29:18 kapalua sshd\[7621\]: Invalid user mauiland from 175.24.109.20
Mar  7 21:29:18 kapalua sshd\[7621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.109.20
Mar  7 21:29:19 kapalua sshd\[7621\]: Failed password for invalid user mauiland from 175.24.109.20 port 40726 ssh2
Mar  7 21:35:24 kapalua sshd\[8020\]: Invalid user ubuntu from 175.24.109.20
Mar  7 21:35:24 kapalua sshd\[8020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.109.20
2020-03-08 17:23:31
142.93.174.86 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-03-08 17:14:50

Recently Reported IPs

104.196.130.80 104.196.140.227 104.196.146.80 104.196.169.84
104.196.170.216 104.196.171.79 104.196.173.125 104.196.173.81
104.196.178.150 104.196.179.235 104.196.18.116 54.47.147.176
104.196.181.85 104.196.196.12 229.35.210.106 104.196.202.206
152.118.25.126 104.196.205.123 104.196.212.229 104.196.215.101