Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: MCI Communications Services, Inc. d/b/a Verizon Business

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.103.104.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55979
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.103.104.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062300 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 23 15:35:51 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 34.104.103.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 34.104.103.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.48.124 attackspambots
2020-04-04T21:51:05.964571linuxbox-skyline sshd[65274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.48.124  user=root
2020-04-04T21:51:07.808059linuxbox-skyline sshd[65274]: Failed password for root from 157.230.48.124 port 39234 ssh2
...
2020-04-05 18:05:15
141.98.81.206 attackspambots
DATE:2020-04-05 11:57:20, IP:141.98.81.206, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-04-05 18:05:37
103.40.28.111 attackbotsspam
$f2bV_matches
2020-04-05 17:25:50
151.84.135.188 attackspam
SSH bruteforce (Triggered fail2ban)
2020-04-05 17:29:10
171.244.139.142 attackspam
Apr  5 11:03:20 v22019038103785759 sshd\[16552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.139.142  user=root
Apr  5 11:03:22 v22019038103785759 sshd\[16552\]: Failed password for root from 171.244.139.142 port 54682 ssh2
Apr  5 11:08:09 v22019038103785759 sshd\[16869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.139.142  user=root
Apr  5 11:08:11 v22019038103785759 sshd\[16869\]: Failed password for root from 171.244.139.142 port 58662 ssh2
Apr  5 11:10:10 v22019038103785759 sshd\[17106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.139.142  user=root
...
2020-04-05 17:38:08
136.49.109.217 attack
Apr  5 12:41:58 hosting sshd[11296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.49.109.217  user=root
Apr  5 12:42:00 hosting sshd[11296]: Failed password for root from 136.49.109.217 port 54166 ssh2
...
2020-04-05 17:50:18
198.98.53.133 attackbots
2020-04-05T11:11:06.798477  sshd[29196]: Invalid user username from 198.98.53.133 port 65092
2020-04-05T11:11:06.813066  sshd[29196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.53.133
2020-04-05T11:11:06.798477  sshd[29196]: Invalid user username from 198.98.53.133 port 65092
2020-04-05T11:11:08.619269  sshd[29196]: Failed password for invalid user username from 198.98.53.133 port 65092 ssh2
...
2020-04-05 17:34:52
177.42.67.253 attackbotsspam
1586058664 - 04/05/2020 05:51:04 Host: 177.42.67.253/177.42.67.253 Port: 445 TCP Blocked
2020-04-05 18:07:10
35.194.69.197 attackspam
2020-04-05T09:07:38.043219shield sshd\[17765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.69.194.35.bc.googleusercontent.com  user=root
2020-04-05T09:07:39.977466shield sshd\[17765\]: Failed password for root from 35.194.69.197 port 33562 ssh2
2020-04-05T09:10:34.700938shield sshd\[18497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.69.194.35.bc.googleusercontent.com  user=root
2020-04-05T09:10:36.463620shield sshd\[18497\]: Failed password for root from 35.194.69.197 port 40974 ssh2
2020-04-05T09:13:35.166997shield sshd\[19639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.69.194.35.bc.googleusercontent.com  user=root
2020-04-05 17:44:37
106.12.83.146 attackbots
SSH invalid-user multiple login attempts
2020-04-05 17:52:55
180.169.129.180 attackspambots
2020-04-05T09:18:49.425880rocketchat.forhosting.nl sshd[22542]: Failed password for root from 180.169.129.180 port 59198 ssh2
2020-04-05T09:21:22.762766rocketchat.forhosting.nl sshd[22605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.169.129.180  user=root
2020-04-05T09:21:25.036018rocketchat.forhosting.nl sshd[22605]: Failed password for root from 180.169.129.180 port 37932 ssh2
...
2020-04-05 18:01:53
167.71.229.19 attack
SSH Login Bruteforce
2020-04-05 17:25:01
45.136.108.85 attackbotsspam
Apr  5 11:34:14 karger sshd[27230]: Connection from 45.136.108.85 port 20529 on 188.68.60.164 port 22
Apr  5 11:34:14 karger sshd[27230]: Invalid user 0 from 45.136.108.85 port 20529
Apr  5 11:34:16 karger sshd[27232]: Connection from 45.136.108.85 port 2658 on 188.68.60.164 port 22
Apr  5 11:34:20 karger sshd[27232]: Invalid user 22 from 45.136.108.85 port 2658
Apr  5 11:34:23 karger sshd[27234]: Connection from 45.136.108.85 port 51925 on 188.68.60.164 port 22
Apr  5 11:34:25 karger sshd[27234]: Invalid user 101 from 45.136.108.85 port 51925
Apr  5 11:34:26 karger sshd[27236]: Connection from 45.136.108.85 port 35992 on 188.68.60.164 port 22
Apr  5 11:34:28 karger sshd[27236]: Invalid user 123 from 45.136.108.85 port 35992
Apr  5 11:34:29 karger sshd[27242]: Connection from 45.136.108.85 port 1218 on 188.68.60.164 port 22
Apr  5 11:34:31 karger sshd[27242]: Invalid user 1111 from 45.136.108.85 port 1218
...
2020-04-05 17:48:29
49.233.75.234 attackspam
$f2bV_matches
2020-04-05 17:49:35
113.167.8.31 attackspam
1586058701 - 04/05/2020 05:51:41 Host: 113.167.8.31/113.167.8.31 Port: 445 TCP Blocked
2020-04-05 17:39:58

Recently Reported IPs

172.14.210.190 184.190.160.32 177.246.178.232 184.252.99.37
204.48.27.32 222.174.134.197 186.166.118.195 167.99.17.135
105.101.194.84 191.233.251.45 217.61.114.230 103.219.248.41
27.164.190.78 36.110.211.3 14.120.3.165 209.219.36.133
53.21.163.248 127.20.96.75 70.58.73.106 165.22.201.156