Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.128.100.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63543
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.128.100.104.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:25:18 CST 2022
;; MSG SIZE  rcvd: 108
Host info
104.100.128.138.in-addr.arpa domain name pointer career78.glitterdesk.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.100.128.138.in-addr.arpa	name = career78.glitterdesk.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.220.140.53 attackspam
Jun 25 14:46:32 game-panel sshd[29867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.220.140.53
Jun 25 14:46:34 game-panel sshd[29867]: Failed password for invalid user tv from 77.220.140.53 port 35824 ssh2
Jun 25 14:48:32 game-panel sshd[29924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.220.140.53
2020-06-26 02:33:36
148.70.77.134 attackbots
2020-06-25T14:18:35.249224randservbullet-proofcloud-66.localdomain sshd[31003]: Invalid user rtm from 148.70.77.134 port 44522
2020-06-25T14:18:35.253621randservbullet-proofcloud-66.localdomain sshd[31003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.77.134
2020-06-25T14:18:35.249224randservbullet-proofcloud-66.localdomain sshd[31003]: Invalid user rtm from 148.70.77.134 port 44522
2020-06-25T14:18:37.549669randservbullet-proofcloud-66.localdomain sshd[31003]: Failed password for invalid user rtm from 148.70.77.134 port 44522 ssh2
...
2020-06-26 02:30:19
36.155.115.95 attackbots
Jun 25 15:48:44 srv-ubuntu-dev3 sshd[60123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95  user=root
Jun 25 15:48:47 srv-ubuntu-dev3 sshd[60123]: Failed password for root from 36.155.115.95 port 51447 ssh2
Jun 25 15:53:39 srv-ubuntu-dev3 sshd[60909]: Invalid user kenneth from 36.155.115.95
Jun 25 15:53:39 srv-ubuntu-dev3 sshd[60909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95
Jun 25 15:53:39 srv-ubuntu-dev3 sshd[60909]: Invalid user kenneth from 36.155.115.95
Jun 25 15:53:42 srv-ubuntu-dev3 sshd[60909]: Failed password for invalid user kenneth from 36.155.115.95 port 46591 ssh2
Jun 25 15:58:31 srv-ubuntu-dev3 sshd[61731]: Invalid user ftptest from 36.155.115.95
Jun 25 15:58:31 srv-ubuntu-dev3 sshd[61731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95
Jun 25 15:58:31 srv-ubuntu-dev3 sshd[61731]: Invalid user ftptest f
...
2020-06-26 02:36:03
159.89.199.182 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-26 03:06:46
94.233.234.8 attackspam
20/6/25@08:22:22: FAIL: Alarm-Network address from=94.233.234.8
...
2020-06-26 02:54:51
120.79.17.144 attackbotsspam
120.79.17.144 - - [25/Jun/2020:14:56:29 +0200] "GET /wp-login.php HTTP/1.1" 200 6398 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
120.79.17.144 - - [25/Jun/2020:14:56:35 +0200] "POST /wp-login.php HTTP/1.1" 200 6649 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
120.79.17.144 - - [25/Jun/2020:14:56:37 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-26 02:52:22
129.204.36.13 attack
2020-06-25T20:25:56.053373ks3355764 sshd[18264]: Failed password for root from 129.204.36.13 port 45890 ssh2
2020-06-25T20:38:27.968308ks3355764 sshd[18647]: Invalid user master from 129.204.36.13 port 34336
...
2020-06-26 02:54:17
88.214.26.90 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-25T16:45:51Z and 2020-06-25T18:41:48Z
2020-06-26 03:04:34
144.217.83.201 attackspambots
2020-06-25T13:33:25.2293601495-001 sshd[34483]: Invalid user facturacion from 144.217.83.201 port 33436
2020-06-25T13:33:27.0306971495-001 sshd[34483]: Failed password for invalid user facturacion from 144.217.83.201 port 33436 ssh2
2020-06-25T13:36:37.5138351495-001 sshd[34628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.ip-144-217-83.net  user=root
2020-06-25T13:36:39.7091411495-001 sshd[34628]: Failed password for root from 144.217.83.201 port 59908 ssh2
2020-06-25T13:39:46.7637891495-001 sshd[34768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.ip-144-217-83.net  user=root
2020-06-25T13:39:49.1993631495-001 sshd[34768]: Failed password for root from 144.217.83.201 port 58146 ssh2
...
2020-06-26 02:48:06
189.113.140.212 attackspam
Automatic report - Port Scan Attack
2020-06-26 03:00:15
54.38.177.68 attackbots
54.38.177.68 - - [25/Jun/2020:14:22:17 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.38.177.68 - - [25/Jun/2020:14:22:19 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.38.177.68 - - [25/Jun/2020:14:22:20 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-26 02:57:36
181.44.68.66 attackbotsspam
Jun 25 17:39:58 vps687878 sshd\[12122\]: Failed password for invalid user nero from 181.44.68.66 port 39933 ssh2
Jun 25 17:44:43 vps687878 sshd\[12529\]: Invalid user win from 181.44.68.66 port 39940
Jun 25 17:44:43 vps687878 sshd\[12529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.44.68.66
Jun 25 17:44:44 vps687878 sshd\[12529\]: Failed password for invalid user win from 181.44.68.66 port 39940 ssh2
Jun 25 17:49:51 vps687878 sshd\[12951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.44.68.66  user=root
...
2020-06-26 03:03:27
218.71.141.62 attack
Jun 25 20:35:01 server sshd[9693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.71.141.62
Jun 25 20:35:03 server sshd[9693]: Failed password for invalid user zahid from 218.71.141.62 port 50916 ssh2
Jun 25 20:36:12 server sshd[9844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.71.141.62
...
2020-06-26 02:53:50
124.106.97.98 attackspambots
20/6/25@08:22:23: FAIL: Alarm-Network address from=124.106.97.98
...
2020-06-26 02:54:29
185.4.29.91 attack
Spam
Received: from WIN-RBLCHHN5LQO.home (static.91.29.4.185.clients.irandns.com [185.4.29.91]); 25 Jun 2020 01:21:25 -0400
2020-06-26 02:51:39

Recently Reported IPs

138.128.10.223 138.128.1.249 138.128.1.151 118.174.92.45
118.174.92.92 157.194.29.156 118.174.93.111 118.174.93.120
14.41.7.253 39.72.8.196 118.174.93.127 118.174.93.14
138.128.107.221 138.128.107.227 138.128.107.218 138.128.107.244
138.128.107.4 138.128.107.239 138.128.107.250 138.128.107.224