Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.128.144.131 botsattack
扫描
104.128.144.131 - - [20/Apr/2019:12:32:14 +0800] "GET / HTTP/1.0" 301 194 "-" "www.probethenet.com scanner"
2019-04-20 12:33:12
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       104.128.144.0 - 104.128.159.255
CIDR:           104.128.144.0/20
NetName:        WIZARD-TOWER
NetHandle:      NET-104-128-144-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Wizard Tower Techno Services (WIZAR-3)
RegDate:        2014-06-04
Updated:        2021-12-14
Comment:        http://www.wizard.ca
Ref:            https://rdap.arin.net/registry/ip/104.128.144.0


OrgName:        Wizard Tower Techno Services
OrgId:          WIZAR-3
Address:        #405-806 Homer Street
City:           Vancouver
StateProv:      BC
PostalCode:     V6B 2W5
Country:        CA
RegDate:        2010-03-16
Updated:        2025-10-14
Ref:            https://rdap.arin.net/registry/entity/WIZAR-3

ReferralServer:  rwhois://rwhois.wizard.ca:4321

OrgTechHandle: MPE214-ARIN
OrgTechName:   Peddemors, Michael 
OrgTechPhone:  +1-604-682-0022 
OrgTechEmail:  michael@wizard.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/MPE214-ARIN

OrgDNSHandle: LNA27-ARIN
OrgDNSName:   LinuxMagic Network Administration
OrgDNSPhone:  +1-604-682-0300 
OrgDNSEmail:  support@linuxmagic.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/LNA27-ARIN

OrgNOCHandle: LNA27-ARIN
OrgNOCName:   LinuxMagic Network Administration
OrgNOCPhone:  +1-604-682-0300 
OrgNOCEmail:  support@linuxmagic.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/LNA27-ARIN

OrgAbuseHandle: LNA27-ARIN
OrgAbuseName:   LinuxMagic Network Administration
OrgAbusePhone:  +1-604-682-0300 
OrgAbuseEmail:  support@linuxmagic.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LNA27-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.wizard.ca:4321.

%rwhois V-1.5:000090:00 rwhois.wizard.ca (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:104.128.144.0/20
network:Class-Name:network
network:ID:WIZAR-3.104.128.144.0/20
network:Network-Name:WIZARD-TOWER
network:IP-Network:104.128.144.0/20
network:Org-Name;I:Wizard Tower Techno Services
network:Street-Address:#405-860 Homer St.
network:City:Vancouver
network:State:BC
network:Postal-Code:V6B 2W5
network:Country-Code:CA
network:Tech-Contact;I:MPE214-ARIN
network:Updated:20150319
network:Updated-By:support@wizard.ca

network:Auth-Area:104.128.144.192/27
network:Class-Name:network
network:ID:WIZAR-4.104.128.144.192/27
network:Network-Name:mThreat-Tech-ProbeTheNet
network:IP-Network:104.128.144.192/27
network:Org-Name;I:mThreat Technology Inc.
network:Street-Address:#405-860 Homer St.
network:City:Vancouver
network:State:BC
network:Postal-Code:V6B 2W5
network:Country-Code:CA
network:Tech-Contact;I:MPE214-ARIN
network:Note:We do occasional tests on IP ranges for varying statistical reasons. These tests are strictly limited to data collection for trend analysis only. http://probethenet.com/
network:Updated:20150319
network:Updated-By:support@mthreat.com

network:Auth-Area:104.128.144.0/22
network:Class-Name:network
network:ID:WIZAR-2.104.128.144.0/22
network:Network-Name:WIZARD-BLOCK1
network:IP-Network:104.128.144.0/22
network:Org-Name;I:Wizard Tower Techno Services
network:Street-Address:#405-860 Homer St.
network:City:Vancouver
network:State:BC
network:Postal-Code:V6B 2W5
network:Country-Code:CA
network:Tech-Contact;I:MPE214-ARIN
network:Updated:20150319
network:Updated-By:support@wizard.ca

%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.128.144.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.128.144.213.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 19:01:29 CST 2026
;; MSG SIZE  rcvd: 108
Host info
213.144.128.104.in-addr.arpa domain name pointer probethenet.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.144.128.104.in-addr.arpa	name = probethenet.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.209.54.54 attackbots
Jan  1 05:57:01 ws22vmsma01 sshd[240434]: Failed password for root from 91.209.54.54 port 51346 ssh2
...
2020-01-01 17:25:22
79.124.8.3 attackbotsspam
Host Scan
2020-01-01 17:08:09
157.230.251.115 attackspam
Jan  1 09:25:53 pornomens sshd\[32382\]: Invalid user ident from 157.230.251.115 port 55334
Jan  1 09:25:53 pornomens sshd\[32382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.251.115
Jan  1 09:25:55 pornomens sshd\[32382\]: Failed password for invalid user ident from 157.230.251.115 port 55334 ssh2
...
2020-01-01 17:07:17
45.55.188.133 attackspambots
*Port Scan* detected from 45.55.188.133 (US/United States/-). 4 hits in the last 105 seconds
2020-01-01 17:34:43
95.110.226.46 attack
Dec 31 22:03:06 web9 sshd\[31518\]: Invalid user puckette from 95.110.226.46
Dec 31 22:03:06 web9 sshd\[31518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.226.46
Dec 31 22:03:08 web9 sshd\[31518\]: Failed password for invalid user puckette from 95.110.226.46 port 50416 ssh2
Dec 31 22:08:22 web9 sshd\[32304\]: Invalid user kartbahn from 95.110.226.46
Dec 31 22:08:22 web9 sshd\[32304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.226.46
2020-01-01 17:13:56
202.137.20.58 attackspambots
Jan  1 08:14:58 legacy sshd[19353]: Failed password for root from 202.137.20.58 port 46109 ssh2
Jan  1 08:17:09 legacy sshd[19412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.20.58
Jan  1 08:17:11 legacy sshd[19412]: Failed password for invalid user breadfruit from 202.137.20.58 port 56311 ssh2
...
2020-01-01 17:12:06
202.88.246.161 attackspam
Jan  1 09:33:57 [host] sshd[21448]: Invalid user alguire from 202.88.246.161
Jan  1 09:33:57 [host] sshd[21448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.246.161
Jan  1 09:33:59 [host] sshd[21448]: Failed password for invalid user alguire from 202.88.246.161 port 58960 ssh2
2020-01-01 17:29:37
173.249.12.113 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-01 17:23:27
104.211.216.173 attackspambots
Jan  1 05:26:14 ws12vmsma01 sshd[56443]: Invalid user vuokkohelena from 104.211.216.173
Jan  1 05:26:16 ws12vmsma01 sshd[56443]: Failed password for invalid user vuokkohelena from 104.211.216.173 port 40860 ssh2
Jan  1 05:28:53 ws12vmsma01 sshd[56878]: Invalid user jisheng from 104.211.216.173
...
2020-01-01 17:14:50
193.112.62.103 attack
Jan  1 08:27:25 MK-Soft-VM7 sshd[11268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.62.103 
Jan  1 08:27:26 MK-Soft-VM7 sshd[11268]: Failed password for invalid user nitto from 193.112.62.103 port 49982 ssh2
...
2020-01-01 17:27:02
106.13.52.234 attackbots
Jan  1 07:46:33 srv-ubuntu-dev3 sshd[19565]: Invalid user user from 106.13.52.234
Jan  1 07:46:33 srv-ubuntu-dev3 sshd[19565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234
Jan  1 07:46:33 srv-ubuntu-dev3 sshd[19565]: Invalid user user from 106.13.52.234
Jan  1 07:46:35 srv-ubuntu-dev3 sshd[19565]: Failed password for invalid user user from 106.13.52.234 port 33080 ssh2
Jan  1 07:49:16 srv-ubuntu-dev3 sshd[19768]: Invalid user web from 106.13.52.234
Jan  1 07:49:16 srv-ubuntu-dev3 sshd[19768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234
Jan  1 07:49:16 srv-ubuntu-dev3 sshd[19768]: Invalid user web from 106.13.52.234
Jan  1 07:49:17 srv-ubuntu-dev3 sshd[19768]: Failed password for invalid user web from 106.13.52.234 port 54484 ssh2
Jan  1 07:51:57 srv-ubuntu-dev3 sshd[19988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.23
...
2020-01-01 17:11:07
203.210.232.31 attack
1577859898 - 01/01/2020 07:24:58 Host: 203.210.232.31/203.210.232.31 Port: 445 TCP Blocked
2020-01-01 17:38:45
95.213.252.226 attackbots
Wordpress login scanning
2020-01-01 17:31:51
138.97.23.190 attackspambots
Invalid user og from 138.97.23.190 port 36778
2020-01-01 17:13:08
45.146.201.251 attack
Jan  1 07:21:20 h2421860 postfix/postscreen[27911]: CONNECT from [45.146.201.251]:37573 to [85.214.119.52]:25
Jan  1 07:21:20 h2421860 postfix/dnsblog[27916]: addr 45.146.201.251 listed by domain b.barracudacentral.org as 127.0.0.2
Jan  1 07:21:20 h2421860 postfix/dnsblog[27916]: addr 45.146.201.251 listed by domain Unknown.trblspam.com as 185.53.179.7
Jan  1 07:21:26 h2421860 postfix/postscreen[27911]: DNSBL rank 3 for [45.146.201.251]:37573
Jan x@x
Jan  1 07:21:27 h2421860 postfix/postscreen[27911]: DISCONNECT [45.146.201.251]:37573


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.146.201.251
2020-01-01 17:19:10

Recently Reported IPs

10.0.2.110 91.79.240.120 47.85.38.170 135.237.125.135
144.202.14.145 174.16.41.113 34.95.241.7 128.127.120.195
1.45.126.89 1.45.126.163 3.144.142.1 20.201.39.131
121.43.116.163 10.26.243.155 116.126.105.210 145.255.8.168
122.226.127.174 91.66.146.156 4.154.227.46 34.12.107.152