Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.168.113.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.168.113.104.		IN	A

;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022300 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 21:58:03 CST 2022
;; MSG SIZE  rcvd: 108
Host info
104.113.168.135.in-addr.arpa domain name pointer nothing.attdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.113.168.135.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.215 attack
Port scan: Attack repeated for 24 hours
2019-07-09 09:32:28
124.166.240.130 attackspam
9011/tcp 5000/tcp 3232/tcp...
[2019-05-08/07-08]192pkt,78pt.(tcp)
2019-07-09 10:09:58
218.92.0.170 attack
tried it too often
2019-07-09 09:32:03
49.204.76.142 attackbotsspam
Tried sshing with brute force.
2019-07-09 09:26:13
177.154.34.148 attackbotsspam
Multiple failed RDP login attempts
2019-07-09 09:54:35
77.28.100.91 attackspam
Unauthorized connection attempt from IP address 77.28.100.91 on Port 445(SMB)
2019-07-09 09:52:19
107.170.202.141 attackbotsspam
1080/tcp 631/tcp 1900/udp...
[2019-05-09/07-08]55pkt,38pt.(tcp),7pt.(udp)
2019-07-09 10:06:14
223.94.95.221 attackbots
Jul  9 02:58:37 MK-Soft-Root2 sshd\[30628\]: Invalid user assassin from 223.94.95.221 port 37084
Jul  9 02:58:37 MK-Soft-Root2 sshd\[30628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.94.95.221
Jul  9 02:58:38 MK-Soft-Root2 sshd\[30628\]: Failed password for invalid user assassin from 223.94.95.221 port 37084 ssh2
...
2019-07-09 09:23:29
191.53.200.206 attackspam
SMTP Fraud Orders
2019-07-09 10:06:42
99.146.240.71 attackbotsspam
Jul  9 00:26:00 mout sshd[14968]: Invalid user 25 from 99.146.240.71 port 41950
Jul  9 00:26:06 mout sshd[14968]: Failed password for invalid user 25 from 99.146.240.71 port 41950 ssh2
Jul  9 00:26:10 mout sshd[14968]: Connection closed by 99.146.240.71 port 41950 [preauth]
2019-07-09 09:53:36
42.118.116.152 attack
Unauthorized connection attempt from IP address 42.118.116.152 on Port 445(SMB)
2019-07-09 10:04:20
218.92.0.155 attack
Jul  9 03:32:41 dev0-dcde-rnet sshd[15717]: Failed password for root from 218.92.0.155 port 2631 ssh2
Jul  9 03:32:57 dev0-dcde-rnet sshd[15717]: error: maximum authentication attempts exceeded for root from 218.92.0.155 port 2631 ssh2 [preauth]
Jul  9 03:33:02 dev0-dcde-rnet sshd[15719]: Failed password for root from 218.92.0.155 port 10130 ssh2
2019-07-09 09:44:17
196.52.43.91 attack
1562610723 - 07/09/2019 01:32:03 Host: 196.52.43.91.netsystemsresearch.com/196.52.43.91 Port: 21 TCP Blocked
...
2019-07-09 09:59:33
153.36.242.143 attackspam
Jul  8 20:37:05 aat-srv002 sshd[18285]: Failed password for root from 153.36.242.143 port 38942 ssh2
Jul  8 20:55:09 aat-srv002 sshd[18548]: Failed password for root from 153.36.242.143 port 47706 ssh2
Jul  8 20:55:19 aat-srv002 sshd[18551]: Failed password for root from 153.36.242.143 port 20361 ssh2
...
2019-07-09 10:01:49
177.74.79.142 attackspambots
Jul  8 20:32:45 pornomens sshd\[12307\]: Invalid user market from 177.74.79.142 port 33716
Jul  8 20:32:45 pornomens sshd\[12307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.74.79.142
Jul  8 20:32:47 pornomens sshd\[12307\]: Failed password for invalid user market from 177.74.79.142 port 33716 ssh2
...
2019-07-09 09:43:14

Recently Reported IPs

84.166.11.77 164.74.154.98 186.175.99.20 3.65.122.76
124.142.232.56 205.66.239.151 162.123.111.36 215.219.23.168
175.247.131.28 94.17.28.116 186.183.32.101 233.84.164.68
32.81.97.205 147.136.38.127 192.76.51.131 130.111.208.217
226.157.150.218 201.55.121.158 74.94.207.175 161.35.141.205