Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.211.243.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.211.243.136.		IN	A

;; AUTHORITY SECTION:
.			394	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 13:57:43 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 136.243.211.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.243.211.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.102.51.28 attack
07/12/2020-17:39:36.768120 94.102.51.28 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-13 05:48:22
69.148.226.251 attackspambots
Jul 12 07:38:25 Tower sshd[40515]: refused connect from 45.181.228.1 (45.181.228.1)
Jul 12 16:01:31 Tower sshd[40515]: Connection from 69.148.226.251 port 49523 on 192.168.10.220 port 22 rdomain ""
Jul 12 16:01:35 Tower sshd[40515]: Invalid user ruser from 69.148.226.251 port 49523
Jul 12 16:01:35 Tower sshd[40515]: error: Could not get shadow information for NOUSER
Jul 12 16:01:35 Tower sshd[40515]: Failed password for invalid user ruser from 69.148.226.251 port 49523 ssh2
Jul 12 16:01:35 Tower sshd[40515]: Received disconnect from 69.148.226.251 port 49523:11: Bye Bye [preauth]
Jul 12 16:01:35 Tower sshd[40515]: Disconnected from invalid user ruser 69.148.226.251 port 49523 [preauth]
2020-07-13 05:57:13
138.68.94.142 attackspam
Jul 12 21:02:25 scw-6657dc sshd[7538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.94.142
Jul 12 21:02:25 scw-6657dc sshd[7538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.94.142
Jul 12 21:02:27 scw-6657dc sshd[7538]: Failed password for invalid user tom from 138.68.94.142 port 58768 ssh2
...
2020-07-13 05:41:55
45.113.102.20 attack
Unauthorized connection attempt from IP address 45.113.102.20 on Port 445(SMB)
2020-07-13 06:01:21
35.199.73.100 attack
Jul 12 21:58:43 localhost sshd\[20397\]: Invalid user telma from 35.199.73.100
Jul 12 21:58:43 localhost sshd\[20397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100
Jul 12 21:58:45 localhost sshd\[20397\]: Failed password for invalid user telma from 35.199.73.100 port 43978 ssh2
Jul 12 22:02:04 localhost sshd\[20668\]: Invalid user vilchis from 35.199.73.100
Jul 12 22:02:04 localhost sshd\[20668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100
...
2020-07-13 05:26:39
121.126.37.150 attackbotsspam
Jul 12 23:14:51 home sshd[21992]: Failed password for www-data from 121.126.37.150 port 55430 ssh2
Jul 12 23:18:34 home sshd[22488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.37.150
Jul 12 23:18:36 home sshd[22488]: Failed password for invalid user mike from 121.126.37.150 port 34834 ssh2
...
2020-07-13 05:24:07
185.143.73.84 attackspambots
2020-07-12 21:29:14 auth_plain authenticator failed for (User) [185.143.73.84]: 535 Incorrect authentication data (set_id=bel@csmailer.org)
2020-07-12 21:30:14 auth_plain authenticator failed for (User) [185.143.73.84]: 535 Incorrect authentication data (set_id=sdn@csmailer.org)
2020-07-12 21:31:10 auth_plain authenticator failed for (User) [185.143.73.84]: 535 Incorrect authentication data (set_id=geography@csmailer.org)
2020-07-12 21:32:14 auth_plain authenticator failed for (User) [185.143.73.84]: 535 Incorrect authentication data (set_id=nfs1@csmailer.org)
2020-07-12 21:33:15 auth_plain authenticator failed for (User) [185.143.73.84]: 535 Incorrect authentication data (set_id=shows@csmailer.org)
...
2020-07-13 05:31:47
128.199.73.25 attack
Jul 12 21:28:48 rush sshd[30270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.73.25
Jul 12 21:28:50 rush sshd[30270]: Failed password for invalid user fraga from 128.199.73.25 port 40290 ssh2
Jul 12 21:31:48 rush sshd[30393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.73.25
...
2020-07-13 05:43:32
94.247.179.224 attackbotsspam
2020-07-12T21:41:10.849551shield sshd\[13609\]: Invalid user admin from 94.247.179.224 port 43130
2020-07-12T21:41:10.859209shield sshd\[13609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-247-179-224.ispfr.net
2020-07-12T21:41:12.694805shield sshd\[13609\]: Failed password for invalid user admin from 94.247.179.224 port 43130 ssh2
2020-07-12T21:43:50.996157shield sshd\[14108\]: Invalid user alfonso from 94.247.179.224 port 47872
2020-07-12T21:43:51.003131shield sshd\[14108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-247-179-224.ispfr.net
2020-07-13 05:46:21
92.62.131.106 attackspam
" "
2020-07-13 05:52:31
216.98.83.202 attackspambots
Port Scan detected!
...
2020-07-13 05:55:08
85.175.177.234 attack
Unauthorized connection attempt from IP address 85.175.177.234 on Port 445(SMB)
2020-07-13 05:54:07
203.110.83.236 attackbots
Unauthorized connection attempt from IP address 203.110.83.236 on Port 445(SMB)
2020-07-13 05:35:35
27.154.66.104 attackbots
[ssh] SSH attack
2020-07-13 05:46:42
129.28.186.100 attack
Invalid user dbseller from 129.28.186.100 port 39012
2020-07-13 05:27:38

Recently Reported IPs

104.211.25.192 104.211.230.17 104.211.46.64 104.211.26.141
104.211.23.177 104.211.47.111 104.211.47.145 104.211.29.88
105.213.101.30 104.211.5.214 104.211.41.215 104.211.5.128
104.211.5.87 104.211.50.18 104.211.60.104 104.211.7.200
104.211.63.229 104.211.59.224 104.211.77.233 104.211.73.126