Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.104.134.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.104.134.1.			IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081500 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 17:36:49 CST 2024
;; MSG SIZE  rcvd: 106
Host info
1.134.104.112.in-addr.arpa domain name pointer 112-104-134-1.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.134.104.112.in-addr.arpa	name = 112-104-134-1.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.140.195.190 attackspam
bruteforce detected
2020-03-30 07:39:33
207.248.62.98 attack
Invalid user tcloud from 207.248.62.98 port 56648
2020-03-30 07:21:41
67.184.68.222 attackbotsspam
Mar 29 23:32:08 mail sshd\[13055\]: Invalid user pi from 67.184.68.222
Mar 29 23:32:08 mail sshd\[13055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.184.68.222
Mar 29 23:32:08 mail sshd\[13057\]: Invalid user pi from 67.184.68.222
Mar 29 23:32:08 mail sshd\[13057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.184.68.222
...
2020-03-30 07:26:08
106.75.28.38 attackbots
Invalid user zik from 106.75.28.38 port 40524
2020-03-30 07:51:08
59.42.114.203 attackbotsspam
Invalid user jboss from 59.42.114.203 port 53824
2020-03-30 07:59:09
84.224.179.156 attackspambots
Invalid user test from 84.224.179.156 port 61559
2020-03-30 07:56:50
134.249.177.31 attackspam
Mar 29 16:35:15 askasleikir sshd[18910]: Failed password for invalid user jboss from 134.249.177.31 port 47390 ssh2
2020-03-30 07:45:25
83.153.30.149 attack
Invalid user michael from 83.153.30.149 port 55108
2020-03-30 07:57:03
92.118.38.82 attack
Mar 30 01:18:34 zeus postfix/smtpd\[5735\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: authentication failure
Mar 30 01:18:56 zeus postfix/smtpd\[5735\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: authentication failure
Mar 30 01:19:19 zeus postfix/smtpd\[5735\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: authentication failure
...
2020-03-30 07:23:05
116.228.37.90 attackbots
Invalid user djc from 116.228.37.90 port 34604
2020-03-30 07:49:14
87.249.45.135 attack
Invalid user yjf from 87.249.45.135 port 35700
2020-03-30 07:34:30
181.49.118.185 attackspambots
Invalid user dpd from 181.49.118.185 port 56258
2020-03-30 07:39:46
193.104.83.97 attack
2020-03-29T22:40:11.589778Z bf166c048adc New connection: 193.104.83.97:34123 (172.17.0.3:2222) [session: bf166c048adc]
2020-03-29T22:52:57.425265Z b76facccc4f5 New connection: 193.104.83.97:35740 (172.17.0.3:2222) [session: b76facccc4f5]
2020-03-30 07:37:41
157.97.68.50 attack
detected by Fail2Ban
2020-03-30 07:43:20
51.254.32.133 attack
Invalid user xingzguo from 51.254.32.133 port 35289
2020-03-30 07:59:52

Recently Reported IPs

112.104.168.38 112.104.128.148 112.104.122.5 112.104.120.90
112.104.115.28 112.104.113.134 112.104.127.60 112.104.102.201
112.104.131.35 112.103.76.186 112.103.93.130 112.104.180.218
112.103.52.136 112.103.55.134 112.103.98.169 112.103.34.205
112.103.74.255 112.103.91.122 112.103.38.141 112.103.50.142