Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.104.138.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.104.138.136.			IN	A

;; AUTHORITY SECTION:
.			430	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100502 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 06 10:09:01 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 136.138.104.16.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 16.104.138.136.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
195.84.49.20 attackbotsspam
suspicious action Fri, 21 Feb 2020 10:11:44 -0300
2020-02-22 04:16:51
212.34.148.230 attack
Brute force attempt
2020-02-22 03:56:38
139.59.4.145 attackbots
WordPress wp-login brute force :: 139.59.4.145 0.076 BYPASS [21/Feb/2020:13:11:23  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-02-22 04:29:00
58.187.168.132 attackspambots
1582290703 - 02/21/2020 14:11:43 Host: 58.187.168.132/58.187.168.132 Port: 445 TCP Blocked
2020-02-22 04:17:31
185.73.113.89 attackspambots
Invalid user webuser from 185.73.113.89 port 51588
2020-02-22 04:26:00
12.39.186.162 attack
Invalid user zhangzihan from 12.39.186.162 port 35008
2020-02-22 04:25:21
103.207.11.7 attack
Feb 21 08:58:03 home sshd[12523]: Invalid user admin from 103.207.11.7 port 39326
Feb 21 08:58:03 home sshd[12523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.7
Feb 21 08:58:03 home sshd[12523]: Invalid user admin from 103.207.11.7 port 39326
Feb 21 08:58:06 home sshd[12523]: Failed password for invalid user admin from 103.207.11.7 port 39326 ssh2
Feb 21 09:06:56 home sshd[12550]: Invalid user thomas from 103.207.11.7 port 56164
Feb 21 09:06:56 home sshd[12550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.7
Feb 21 09:06:56 home sshd[12550]: Invalid user thomas from 103.207.11.7 port 56164
Feb 21 09:06:58 home sshd[12550]: Failed password for invalid user thomas from 103.207.11.7 port 56164 ssh2
Feb 21 09:09:54 home sshd[12558]: Invalid user server from 103.207.11.7 port 40300
Feb 21 09:09:54 home sshd[12558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.
2020-02-22 04:19:54
49.145.234.253 attackspam
Unauthorized connection attempt from IP address 49.145.234.253 on Port 445(SMB)
2020-02-22 03:59:50
194.26.29.129 attack
02/21/2020-14:17:50.471969 194.26.29.129 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-22 04:24:27
206.189.239.103 attack
$f2bV_matches
2020-02-22 03:57:58
85.173.132.53 attackbotsspam
Email rejected due to spam filtering
2020-02-22 04:20:29
210.131.0.50 spam
info@jackrabbit.co.nz which send to :
http://www.superpuperr.blogspot.com/p9okhbhjbrftfp9okgvkjn => Google => Yahoo => Yeah etc. => abusecomplaints@markmonitor.com
Message-ID: <0602d3e3e8c316e5c63442111acef24e6de0e44e91@jackrabbit.co.nz> => 210.131.0.50
jackrabbit.co.nz => 104.18.55.251
210.131.0.50 => hostmaster@nic.ad.jp
https://en.asytech.cn/report-ip/210.131.0.50
nifty.com => tech-contact@nifty.ad.jp, nifty-admin@list.nifty.co.jp, nifty-tec@list.nifty.co.jp, gtld-abuse@jprs.jp
https://www.mywot.com/scorecard/bizmail.nifty.com
https://www.mywot.com/scorecard/nifty.com
nifty.com => 222.158.213.148
2020-02-22 04:07:48
77.87.96.46 attackspambots
Email rejected due to spam filtering
2020-02-22 04:11:20
176.114.228.40 attackspambots
TCP src-port=47231   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (234)
2020-02-22 04:28:22
45.118.151.85 attack
Feb 21 18:32:41 ift sshd\[28952\]: Invalid user lijin from 45.118.151.85Feb 21 18:32:43 ift sshd\[28952\]: Failed password for invalid user lijin from 45.118.151.85 port 53334 ssh2Feb 21 18:36:03 ift sshd\[29518\]: Invalid user yyg from 45.118.151.85Feb 21 18:36:06 ift sshd\[29518\]: Failed password for invalid user yyg from 45.118.151.85 port 53728 ssh2Feb 21 18:39:24 ift sshd\[29984\]: Invalid user kevin from 45.118.151.85
...
2020-02-22 04:07:31

Recently Reported IPs

57.122.90.136 2.200.55.50 65.109.252.111 168.28.240.170
5.153.27.129 64.90.115.181 13.81.200.123 65.89.79.245
208.169.10.239 242.162.196.142 202.195.193.222 161.50.238.117
172.104.1.5 52.124.131.52 46.37.236.12 121.189.175.209
229.61.122.192 177.59.188.102 82.12.113.161 127.116.140.102