Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       131.104.0.0 - 131.104.255.255
CIDR:           131.104.0.0/16
NetName:        UOGUELPH
NetHandle:      NET-131-104-0-0-1
Parent:         NET131 (NET-131-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   University of Guelph (UNIVER-279-Z)
RegDate:        1988-11-04
Updated:        2023-11-14
Ref:            https://rdap.arin.net/registry/ip/131.104.0.0


OrgName:        University of Guelph
OrgId:          UNIVER-279-Z
Address:        Networking Services Johnston Hall
Address:        University of Guelph
City:           Guelph
StateProv:      ON
PostalCode:     N1G-2W1
Country:        CA
RegDate:        2023-11-09
Updated:        2023-11-09
Ref:            https://rdap.arin.net/registry/entity/UNIVER-279-Z


OrgAbuseHandle: ISC25-ARIN
OrgAbuseName:   Information Security - CCS
OrgAbusePhone:  +1-519-824-4120 
OrgAbuseEmail:  song@uoguelph.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ISC25-ARIN

OrgTechHandle: NO17-ORG-ARIN
OrgTechName:   Network Operations Centre
OrgTechPhone:  +1-519-824-4120 
OrgTechEmail:  song@uoguelph.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/NO17-ORG-ARIN

RTechHandle: NO17-ORG-ARIN
RTechName:   Network Operations Centre
RTechPhone:  +1-519-824-4120 
RTechEmail:  song@uoguelph.ca
RTechRef:    https://rdap.arin.net/registry/entity/NO17-ORG-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.104.99.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.104.99.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020600 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 20:39:53 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 150.99.104.131.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.99.104.131.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
31.163.224.217 attackspambots
SMTP-SASL bruteforce attempt
2020-01-14 21:29:07
188.209.31.211 attack
Unauthorized connection attempt detected from IP address 188.209.31.211 to port 8000 [J]
2020-01-14 21:07:33
154.66.25.163 attack
1579007101 - 01/14/2020 14:05:01 Host: 154.66.25.163/154.66.25.163 Port: 445 TCP Blocked
2020-01-14 21:28:13
5.88.168.246 attackbotsspam
Jan 14 14:02:28 sd-53420 sshd\[23342\]: Invalid user admin from 5.88.168.246
Jan 14 14:02:28 sd-53420 sshd\[23342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.88.168.246
Jan 14 14:02:30 sd-53420 sshd\[23342\]: Failed password for invalid user admin from 5.88.168.246 port 33138 ssh2
Jan 14 14:05:19 sd-53420 sshd\[23835\]: User root from 5.88.168.246 not allowed because none of user's groups are listed in AllowGroups
Jan 14 14:05:19 sd-53420 sshd\[23835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.88.168.246  user=root
...
2020-01-14 21:10:23
167.71.79.152 attack
Jan 14 12:29:56 nbi-636 sshd[2499]: Invalid user user02 from 167.71.79.152 port 42232
Jan 14 12:29:58 nbi-636 sshd[2499]: Failed password for invalid user user02 from 167.71.79.152 port 42232 ssh2
Jan 14 12:29:58 nbi-636 sshd[2499]: Received disconnect from 167.71.79.152 port 42232:11: Bye Bye [preauth]
Jan 14 12:29:58 nbi-636 sshd[2499]: Disconnected from 167.71.79.152 port 42232 [preauth]
Jan 14 12:39:36 nbi-636 sshd[5666]: User r.r from 167.71.79.152 not allowed because not listed in AllowUsers
Jan 14 12:39:36 nbi-636 sshd[5666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.79.152  user=r.r
Jan 14 12:39:38 nbi-636 sshd[5666]: Failed password for invalid user r.r from 167.71.79.152 port 41684 ssh2
Jan 14 12:39:38 nbi-636 sshd[5666]: Received disconnect from 167.71.79.152 port 41684:11: Bye Bye [preauth]
Jan 14 12:39:38 nbi-636 sshd[5666]: Disconnected from 167.71.79.152 port 41684 [preauth]
Jan 14 12:41:43 nbi-636 sshd........
-------------------------------
2020-01-14 21:17:53
110.53.234.52 attack
ICMP MH Probe, Scan /Distributed -
2020-01-14 21:15:17
109.91.130.204 attackspam
Jan 14 14:05:11 vmanager6029 sshd\[5442\]: Invalid user toyota from 109.91.130.204 port 55202
Jan 14 14:05:11 vmanager6029 sshd\[5442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.91.130.204
Jan 14 14:05:13 vmanager6029 sshd\[5442\]: Failed password for invalid user toyota from 109.91.130.204 port 55202 ssh2
2020-01-14 21:16:30
116.107.58.141 attack
SMTP-SASL bruteforce attempt
2020-01-14 21:29:58
118.122.253.20 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 21:41:34
177.66.118.20 attackspam
postfix
2020-01-14 21:36:09
86.23.102.84 attackspam
Jan 14 08:05:07 123flo sshd[28682]: Invalid user pi from 86.23.102.84
Jan 14 08:05:08 123flo sshd[28682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpc89770-stok19-2-0-cust9811.1-4.cable.virginm.net 
Jan 14 08:05:07 123flo sshd[28682]: Invalid user pi from 86.23.102.84
Jan 14 08:05:10 123flo sshd[28682]: Failed password for invalid user pi from 86.23.102.84 port 38206 ssh2
Jan 14 08:05:18 123flo sshd[28714]: Invalid user pi from 86.23.102.84
2020-01-14 21:11:12
42.119.158.169 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 14-01-2020 13:05:17.
2020-01-14 21:11:49
110.53.234.250 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-01-14 21:22:36
218.92.0.184 attack
Jan 14 14:09:52 server sshd[19388]: Failed none for root from 218.92.0.184 port 57984 ssh2
Jan 14 14:09:57 server sshd[19388]: Failed password for root from 218.92.0.184 port 57984 ssh2
Jan 14 14:10:01 server sshd[19388]: Failed password for root from 218.92.0.184 port 57984 ssh2
2020-01-14 21:21:25
118.190.104.31 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 21:26:13

Recently Reported IPs

8.215.41.147 106.54.176.158 8.129.86.52 211.175.22.22
57.135.128.105 46.201.41.112 106.11.31.25 52.146.21.82
1.4.134.5 103.208.70.212 94.231.206.4 94.231.206.35
154.64.243.99 202.160.86.40 202.160.86.203 35.241.167.51
3.230.41.50 123.191.142.185 107.174.52.175 8.163.17.81