Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.213.104.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27639
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;8.213.104.136.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 23 01:10:22 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 136.104.213.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 136.104.213.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.60.60.84 attackspam
Dec 12 11:50:44 web8 sshd\[28457\]: Invalid user darcie from 200.60.60.84
Dec 12 11:50:44 web8 sshd\[28457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.60.84
Dec 12 11:50:46 web8 sshd\[28457\]: Failed password for invalid user darcie from 200.60.60.84 port 47061 ssh2
Dec 12 11:59:51 web8 sshd\[555\]: Invalid user sandemose from 200.60.60.84
Dec 12 11:59:51 web8 sshd\[555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.60.84
2019-12-12 20:14:10
222.184.233.222 attackspambots
Automatic report: SSH brute force attempt
2019-12-12 20:24:24
139.0.12.19 attackspambots
Unauthorized connection attempt detected from IP address 139.0.12.19 to port 445
2019-12-12 20:11:21
92.118.38.38 attackbotsspam
Dec 12 13:18:09 webserver postfix/smtpd\[15635\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 12 13:18:44 webserver postfix/smtpd\[15635\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 12 13:19:18 webserver postfix/smtpd\[15635\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 12 13:19:53 webserver postfix/smtpd\[15653\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 12 13:20:28 webserver postfix/smtpd\[15635\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-12 20:35:59
63.81.87.100 attackspambots
Dec 12 08:17:44 grey postfix/smtpd\[17821\]: NOQUEUE: reject: RCPT from announce.vidyad.com\[63.81.87.100\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.100\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.100\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-12 20:18:04
58.221.101.182 attackspam
Dec 12 17:29:07 vibhu-HP-Z238-Microtower-Workstation sshd\[3966\]: Invalid user 1q2w3e4r5t6y7u from 58.221.101.182
Dec 12 17:29:07 vibhu-HP-Z238-Microtower-Workstation sshd\[3966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.101.182
Dec 12 17:29:09 vibhu-HP-Z238-Microtower-Workstation sshd\[3966\]: Failed password for invalid user 1q2w3e4r5t6y7u from 58.221.101.182 port 54090 ssh2
Dec 12 17:37:31 vibhu-HP-Z238-Microtower-Workstation sshd\[4660\]: Invalid user passpass from 58.221.101.182
Dec 12 17:37:31 vibhu-HP-Z238-Microtower-Workstation sshd\[4660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.101.182
...
2019-12-12 20:27:19
185.156.73.52 attackbots
12/12/2019-07:06:37.663590 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-12 20:11:56
27.62.3.211 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:16.
2019-12-12 20:07:12
182.61.31.79 attackspam
$f2bV_matches
2019-12-12 20:25:11
195.154.220.114 attackspam
5070/udp 5070/udp 5070/udp...
[2019-12-10/12]4pkt,1pt.(udp)
2019-12-12 20:13:41
34.70.249.37 attackspam
Wordpress attack
2019-12-12 20:30:56
1.53.88.143 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:14.
2019-12-12 20:10:14
103.231.32.79 attackbotsspam
1576135076 - 12/12/2019 08:17:56 Host: 103.231.32.79/103.231.32.79 Port: 445 TCP Blocked
2019-12-12 20:29:33
59.151.31.183 attackspambots
SSH Bruteforce attempt
2019-12-12 20:03:52
159.253.32.120 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-12-12 20:15:41

Recently Reported IPs

165.244.155.181 56.36.156.16 66.236.88.178 132.110.138.156
82.120.182.227 114.65.108.30 101.153.81.159 66.166.153.162
182.137.154.158 53.67.194.242 205.78.147.193 106.13.167.97
64.205.48.204 142.92.33.199 86.212.126.163 182.150.217.9
63.106.203.193 114.48.120.128 187.150.227.151 215.93.94.18