Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Memphis

Region: Tennessee

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.104.28.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50255
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.104.28.134.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 05 21:09:47 CST 2019
;; MSG SIZE  rcvd: 117
Host info
134.28.104.72.in-addr.arpa domain name pointer 134.sub-72-104-28.myvzw.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
134.28.104.72.in-addr.arpa	name = 134.sub-72-104-28.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.104.246 attack
(sshd) Failed SSH login from 182.61.104.246 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 19 20:10:10 andromeda sshd[4807]: Invalid user bsbk from 182.61.104.246 port 32538
Apr 19 20:10:12 andromeda sshd[4807]: Failed password for invalid user bsbk from 182.61.104.246 port 32538 ssh2
Apr 19 20:13:50 andromeda sshd[4896]: Invalid user ubuntu from 182.61.104.246 port 33461
2020-04-20 06:57:34
106.12.110.157 attackbots
Apr 19 15:54:07 server1 sshd\[4951\]: Failed password for invalid user rt from 106.12.110.157 port 9113 ssh2
Apr 19 15:57:23 server1 sshd\[5979\]: Invalid user gj from 106.12.110.157
Apr 19 15:57:23 server1 sshd\[5979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.110.157 
Apr 19 15:57:25 server1 sshd\[5979\]: Failed password for invalid user gj from 106.12.110.157 port 58125 ssh2
Apr 19 16:00:33 server1 sshd\[6930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.110.157  user=root
...
2020-04-20 07:00:10
54.37.153.80 attackspambots
Invalid user qc from 54.37.153.80 port 59526
2020-04-20 07:17:44
203.86.235.224 attack
Apr 19 23:55:15 raspberrypi sshd[16255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.86.235.224
2020-04-20 06:39:34
180.76.118.175 attack
SSH Invalid Login
2020-04-20 07:16:40
60.217.48.181 attackbots
[portscan] Port scan
2020-04-20 06:50:37
190.5.241.138 attackspambots
5x Failed Password
2020-04-20 06:47:52
31.184.254.175 attackspambots
SSH Invalid Login
2020-04-20 07:12:19
139.59.84.29 attackspambots
Apr 19 22:42:06 h2779839 sshd[11046]: Invalid user by from 139.59.84.29 port 57546
Apr 19 22:42:06 h2779839 sshd[11046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29
Apr 19 22:42:06 h2779839 sshd[11046]: Invalid user by from 139.59.84.29 port 57546
Apr 19 22:42:08 h2779839 sshd[11046]: Failed password for invalid user by from 139.59.84.29 port 57546 ssh2
Apr 19 22:45:35 h2779839 sshd[11072]: Invalid user admin from 139.59.84.29 port 58602
Apr 19 22:45:35 h2779839 sshd[11072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29
Apr 19 22:45:35 h2779839 sshd[11072]: Invalid user admin from 139.59.84.29 port 58602
Apr 19 22:45:37 h2779839 sshd[11072]: Failed password for invalid user admin from 139.59.84.29 port 58602 ssh2
Apr 19 22:49:11 h2779839 sshd[11096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29  user=root
Apr 19 22:49:13
...
2020-04-20 06:46:16
103.138.188.45 attack
$f2bV_matches
2020-04-20 06:47:05
180.76.151.90 attack
Invalid user xw from 180.76.151.90 port 57424
2020-04-20 07:13:41
178.32.35.79 attack
$f2bV_matches
2020-04-20 06:53:03
112.35.33.79 attackbotsspam
Apr 20 04:08:18 webhost01 sshd[2199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.33.79
Apr 20 04:08:20 webhost01 sshd[2199]: Failed password for invalid user cent from 112.35.33.79 port 60937 ssh2
...
2020-04-20 07:09:19
112.85.42.188 attackbotsspam
04/19/2020-19:11:37.687250 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-20 07:11:56
217.61.121.57 attackspambots
Invalid user git from 217.61.121.57 port 36882
2020-04-20 07:05:22

Recently Reported IPs

225.206.224.14 231.159.135.125 127.22.160.229 14.251.151.238
105.96.18.148 49.206.125.46 62.28.20.178 165.22.91.192
64.109.187.71 196.249.39.240 43.241.67.197 45.153.141.1
102.134.2.42 76.30.110.221 61.94.233.181 117.254.111.7
187.192.143.86 182.64.211.191 14.207.171.7 117.7.96.75