Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.136.104.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.136.104.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 18:18:50 CST 2024
;; MSG SIZE  rcvd: 106
Host info
137.104.136.2.in-addr.arpa domain name pointer 137.red-2-136-104.staticip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.104.136.2.in-addr.arpa	name = 137.red-2-136-104.staticip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.77.226.68 attackbotsspam
2020-06-22T04:21:08.027475shield sshd\[554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.226.68  user=root
2020-06-22T04:21:09.842863shield sshd\[554\]: Failed password for root from 51.77.226.68 port 55802 ssh2
2020-06-22T04:24:22.671173shield sshd\[838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.226.68  user=root
2020-06-22T04:24:24.451520shield sshd\[838\]: Failed password for root from 51.77.226.68 port 56446 ssh2
2020-06-22T04:27:44.581073shield sshd\[1152\]: Invalid user guest from 51.77.226.68 port 57092
2020-06-22 15:58:41
54.38.159.178 attack
2020-06-22T07:23:16.505130sd-86998 sshd[8945]: Invalid user abc123 from 54.38.159.178 port 38896
2020-06-22T07:23:16.510264sd-86998 sshd[8945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-54-38-159.eu
2020-06-22T07:23:16.505130sd-86998 sshd[8945]: Invalid user abc123 from 54.38.159.178 port 38896
2020-06-22T07:23:19.116850sd-86998 sshd[8945]: Failed password for invalid user abc123 from 54.38.159.178 port 38896 ssh2
2020-06-22T07:26:27.676154sd-86998 sshd[9373]: Invalid user 123456789 from 54.38.159.178 port 40454
...
2020-06-22 15:33:02
87.251.74.18 attackbotsspam
Unauthorized connection attempt from IP address 87.251.74.18 on Port 3389(RDP)
2020-06-22 15:46:34
49.234.83.26 attackspambots
Failed password for invalid user matt from 49.234.83.26 port 47196 ssh2
2020-06-22 15:28:00
206.189.88.253 attack
Attempted connection to port 1081.
2020-06-22 16:01:27
142.93.35.169 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-06-22 16:02:17
159.65.154.48 attackbotsspam
 TCP (SYN) 159.65.154.48:56194 -> port 16824, len 44
2020-06-22 15:51:19
160.153.147.152 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-22 15:59:58
185.120.77.152 attackspambots
Jun 22 08:18:06 piServer sshd[2588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.120.77.152 
Jun 22 08:18:07 piServer sshd[2588]: Failed password for invalid user x from 185.120.77.152 port 38834 ssh2
Jun 22 08:23:33 piServer sshd[3111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.120.77.152 
...
2020-06-22 15:35:14
106.52.159.28 attack
2020-06-22T03:42:33.390061abusebot.cloudsearch.cf sshd[26352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.159.28  user=root
2020-06-22T03:42:35.396601abusebot.cloudsearch.cf sshd[26352]: Failed password for root from 106.52.159.28 port 41628 ssh2
2020-06-22T03:47:10.248902abusebot.cloudsearch.cf sshd[26661]: Invalid user bob from 106.52.159.28 port 34186
2020-06-22T03:47:10.254753abusebot.cloudsearch.cf sshd[26661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.159.28
2020-06-22T03:47:10.248902abusebot.cloudsearch.cf sshd[26661]: Invalid user bob from 106.52.159.28 port 34186
2020-06-22T03:47:12.622247abusebot.cloudsearch.cf sshd[26661]: Failed password for invalid user bob from 106.52.159.28 port 34186 ssh2
2020-06-22T03:51:38.983963abusebot.cloudsearch.cf sshd[27029]: Invalid user redmine from 106.52.159.28 port 54964
...
2020-06-22 15:57:05
94.176.189.147 attackspam
SpamScore above: 10.0
2020-06-22 15:23:43
182.61.136.3 attackbots
W 5701,/var/log/auth.log,-,-
2020-06-22 15:58:18
104.236.100.42 attackbotsspam
Attempt to hack Wordpress Login, XMLRPC or other login
2020-06-22 15:57:31
45.148.10.94 attack
Jun 22 13:52:15 localhost sshd[2394229]: Connection closed by 45.148.10.94 port 45804 [preauth]
...
2020-06-22 15:29:07
80.90.82.70 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-06-22 15:48:14

Recently Reported IPs

76.66.225.61 230.36.74.116 224.223.112.163 76.66.3.212
109.193.240.170 29.56.40.248 86.208.41.31 84.66.119.42
60.205.30.83 107.243.125.17 157.176.111.106 6.47.50.201
51.94.182.111 125.130.135.173 212.161.186.32 190.181.103.67
118.158.0.65 250.244.249.37 64.247.233.177 242.40.245.98