Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Google LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
firewall-block, port(s): 5900/tcp
2019-10-29 21:22:31
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.199.52.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.199.52.136.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102900 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 29 21:22:22 CST 2019
;; MSG SIZE  rcvd: 118
Host info
136.52.199.104.in-addr.arpa domain name pointer 136.52.199.104.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.52.199.104.in-addr.arpa	name = 136.52.199.104.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
151.80.41.205 attackbotsspam
Mar  5 17:39:06 areeb-Workstation sshd[32571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.41.205 
Mar  5 17:39:08 areeb-Workstation sshd[32571]: Failed password for invalid user teste from 151.80.41.205 port 34558 ssh2
...
2020-03-05 20:32:15
58.57.54.18 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 21:05:06
175.143.15.79 attack
attempted connection to port 88
2020-03-05 20:36:27
36.85.220.213 attack
Unauthorized connection attempt from IP address 36.85.220.213 on Port 445(SMB)
2020-03-05 20:43:43
171.241.36.39 attackbotsspam
attempted connection to port 26
2020-03-05 20:39:47
14.254.252.32 attackbots
445/tcp 445/tcp
[2020-02-24/03-05]2pkt
2020-03-05 20:58:33
77.35.245.96 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 20:45:36
222.186.175.212 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Failed password for root from 222.186.175.212 port 5446 ssh2
Failed password for root from 222.186.175.212 port 5446 ssh2
Failed password for root from 222.186.175.212 port 5446 ssh2
Failed password for root from 222.186.175.212 port 5446 ssh2
2020-03-05 21:06:33
165.22.92.109 attackspam
Banned by Fail2Ban.
2020-03-05 21:00:29
200.105.212.206 attackbots
Unauthorized connection attempt from IP address 200.105.212.206 on Port 445(SMB)
2020-03-05 20:46:06
137.74.167.228 attackbots
Mar  3 03:06:25 host sshd[25015]: Invalid user first from 137.74.167.228 port 40066
Mar  3 03:06:25 host sshd[25015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.228
Mar  3 03:06:27 host sshd[25015]: Failed password for invalid user first from 137.74.167.228 port 40066 ssh2
Mar  3 03:06:27 host sshd[25015]: Received disconnect from 137.74.167.228 port 40066:11: Bye Bye [preauth]
Mar  3 03:06:27 host sshd[25015]: Disconnected from invalid user first 137.74.167.228 port 40066 [preauth]
Mar  3 03:23:47 host sshd[25315]: User r.r from 137.74.167.228 not allowed because none of user's groups are listed in AllowGroups
Mar  3 03:23:47 host sshd[25315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.228  user=r.r
Mar  3 03:23:48 host sshd[25315]: Failed password for invalid user r.r from 137.74.167.228 port 47548 ssh2
Mar  3 03:23:48 host sshd[25315]: Received disconnect f........
-------------------------------
2020-03-05 20:53:38
27.79.244.247 attack
Unauthorized connection attempt from IP address 27.79.244.247 on Port 445(SMB)
2020-03-05 20:27:51
188.170.219.221 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 20:29:40
187.109.13.1 attackbots
Unauthorized connection attempt from IP address 187.109.13.1 on Port 445(SMB)
2020-03-05 20:52:18
43.226.150.151 attack
Mar  5 12:40:02 MK-Soft-VM7 sshd[12240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.150.151 
Mar  5 12:40:03 MK-Soft-VM7 sshd[12240]: Failed password for invalid user uno85 from 43.226.150.151 port 45996 ssh2
...
2020-03-05 20:41:16

Recently Reported IPs

118.208.140.93 104.245.49.108 197.89.78.96 151.27.121.40
45.125.149.221 134.209.88.11 39.42.137.234 125.239.166.154
213.189.40.10 203.177.60.238 201.241.158.75 49.233.82.228
104.245.145.13 1.191.22.187 247.99.66.62 198.8.93.14
115.225.167.108 94.159.143.111 103.81.192.22 220.225.118.170