Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.0.190.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.0.190.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 23:56:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
114.190.0.104.in-addr.arpa domain name pointer 104-0-190-114.lightspeed.iplsin.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.190.0.104.in-addr.arpa	name = 104-0-190-114.lightspeed.iplsin.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.254.184.247 attack
Dec 24 07:20:02 localhost sshd\[26454\]: Invalid user ts3 from 182.254.184.247 port 56366
Dec 24 07:20:02 localhost sshd\[26454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.184.247
Dec 24 07:20:04 localhost sshd\[26454\]: Failed password for invalid user ts3 from 182.254.184.247 port 56366 ssh2
...
2019-12-24 16:14:06
106.12.207.197 attackspambots
Dec 24 05:17:16 ws12vmsma01 sshd[50300]: Failed password for invalid user saastad from 106.12.207.197 port 44632 ssh2
Dec 24 05:19:42 ws12vmsma01 sshd[50728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.207.197  user=root
Dec 24 05:19:44 ws12vmsma01 sshd[50728]: Failed password for root from 106.12.207.197 port 35296 ssh2
...
2019-12-24 16:30:24
202.126.208.122 attack
Dec 24 08:20:07 host sshd[33249]: Invalid user bohr from 202.126.208.122 port 56341
...
2019-12-24 16:11:55
156.213.25.20 attackspam
"SERVER-WEBAPP D-Link DSL-2750B routers login.cgi command injection attempt"
2019-12-24 16:19:32
122.51.72.86 attackbots
Automatic report - SSH Brute-Force Attack
2019-12-24 16:32:23
81.182.254.124 attackspambots
Dec 24 08:08:10 xeon sshd[969]: Failed password for root from 81.182.254.124 port 47460 ssh2
2019-12-24 16:19:54
222.186.180.8 attackbots
Dec 24 13:54:07 vibhu-HP-Z238-Microtower-Workstation sshd\[15414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Dec 24 13:54:09 vibhu-HP-Z238-Microtower-Workstation sshd\[15414\]: Failed password for root from 222.186.180.8 port 64732 ssh2
Dec 24 13:54:13 vibhu-HP-Z238-Microtower-Workstation sshd\[15414\]: Failed password for root from 222.186.180.8 port 64732 ssh2
Dec 24 13:54:16 vibhu-HP-Z238-Microtower-Workstation sshd\[15414\]: Failed password for root from 222.186.180.8 port 64732 ssh2
Dec 24 13:54:31 vibhu-HP-Z238-Microtower-Workstation sshd\[15466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
...
2019-12-24 16:29:55
143.107.154.55 attackbotsspam
Dec 24 07:48:31 zeus sshd[24774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.107.154.55 
Dec 24 07:48:33 zeus sshd[24774]: Failed password for invalid user ie from 143.107.154.55 port 33263 ssh2
Dec 24 07:52:39 zeus sshd[24884]: Failed password for root from 143.107.154.55 port 49789 ssh2
2019-12-24 16:09:45
82.79.67.15 attack
Automatic report - Banned IP Access
2019-12-24 16:33:23
144.64.12.241 attackspam
Honeypot attack, port: 81, PTR: bl23-12-241.dsl.telepac.pt.
2019-12-24 16:18:43
113.177.40.254 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 24-12-2019 07:20:09.
2019-12-24 16:06:33
223.247.223.39 attack
Dec 24 07:20:14 *** sshd[3686]: Invalid user Offline from 223.247.223.39
2019-12-24 15:56:32
189.236.3.127 attackbotsspam
Honeypot attack, port: 81, PTR: dsl-189-236-3-127-dyn.prod-infinitum.com.mx.
2019-12-24 15:57:29
180.249.181.3 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-24 16:00:30
36.239.74.53 attack
Honeypot attack, port: 23, PTR: 36-239-74-53.dynamic-ip.hinet.net.
2019-12-24 16:04:40

Recently Reported IPs

115.121.0.32 153.45.227.200 38.192.212.62 4.15.201.46
99.133.95.180 87.181.149.133 91.193.238.62 212.153.243.86
107.80.106.148 117.204.66.27 130.85.127.77 147.249.230.176
27.216.179.225 216.96.252.106 145.84.204.22 44.42.119.14
220.72.49.147 65.223.133.126 24.112.86.225 225.238.225.30