Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.14.58.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.14.58.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 21:41:16 CST 2025
;; MSG SIZE  rcvd: 106
Host info
140.58.14.104.in-addr.arpa domain name pointer 104-14-58-140.lightspeed.ltrkar.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.58.14.104.in-addr.arpa	name = 104-14-58-140.lightspeed.ltrkar.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.133.55.101 attackbotsspam
" "
2019-12-10 21:53:30
113.104.243.233 attack
Dec x@x
Dec 10 06:43:42 carla sshd[16742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.104.243.233 
Dec x@x
Dec 10 06:43:45 carla sshd[16743]: Received disconnect from 113.104.243.233: 11: Bye Bye
Dec 10 07:07:38 carla sshd[17029]: Invalid user tagata from 113.104.243.233
Dec 10 07:07:38 carla sshd[17029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.104.243.233 
Dec 10 07:07:40 carla sshd[17029]: Failed password for invalid user tagata from 113.104.243.233 port 6487 ssh2
Dec 10 07:07:40 carla sshd[17030]: Received disconnect from 113.104.243.233: 11: Bye Bye
Dec 10 07:15:52 carla sshd[17097]: Invalid user laikyn from 113.104.243.233
Dec 10 07:15:52 carla sshd[17097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.104.243.233 
Dec 10 07:15:55 carla sshd[17097]: Failed password for invalid user laikyn from 113.104.243.233 port 8525 s........
-------------------------------
2019-12-10 21:54:21
222.186.173.226 attackbotsspam
Dec 10 15:04:40 minden010 sshd[8069]: Failed password for root from 222.186.173.226 port 36472 ssh2
Dec 10 15:04:43 minden010 sshd[8069]: Failed password for root from 222.186.173.226 port 36472 ssh2
Dec 10 15:04:47 minden010 sshd[8069]: Failed password for root from 222.186.173.226 port 36472 ssh2
Dec 10 15:04:51 minden010 sshd[8069]: Failed password for root from 222.186.173.226 port 36472 ssh2
...
2019-12-10 22:16:16
165.22.21.12 attackbotsspam
Dec 10 16:23:49 server sshd\[23104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.21.12  user=mysql
Dec 10 16:23:51 server sshd\[23104\]: Failed password for mysql from 165.22.21.12 port 32944 ssh2
Dec 10 16:30:08 server sshd\[25577\]: Invalid user astrid from 165.22.21.12
Dec 10 16:30:08 server sshd\[25577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.21.12 
Dec 10 16:30:10 server sshd\[25577\]: Failed password for invalid user astrid from 165.22.21.12 port 58028 ssh2
...
2019-12-10 21:38:56
134.209.64.10 attackspam
Dec  9 22:59:53 web9 sshd\[28186\]: Invalid user server from 134.209.64.10
Dec  9 22:59:53 web9 sshd\[28186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10
Dec  9 22:59:56 web9 sshd\[28186\]: Failed password for invalid user server from 134.209.64.10 port 53388 ssh2
Dec  9 23:05:26 web9 sshd\[29170\]: Invalid user host from 134.209.64.10
Dec  9 23:05:26 web9 sshd\[29170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10
2019-12-10 22:00:33
129.213.139.9 attackbotsspam
leo_www
2019-12-10 21:40:55
115.84.112.98 attackbotsspam
$f2bV_matches
2019-12-10 21:39:29
185.209.0.18 attackspambots
12/10/2019-08:50:29.693053 185.209.0.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-10 22:02:15
159.203.176.82 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-12-10 21:58:44
45.77.146.50 attackspam
Dec 10 06:06:14 lamijardin sshd[32306]: Invalid user zliu from 45.77.146.50
Dec 10 06:06:14 lamijardin sshd[32306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.77.146.50
Dec 10 06:06:16 lamijardin sshd[32306]: Failed password for invalid user zliu from 45.77.146.50 port 36962 ssh2
Dec 10 06:06:16 lamijardin sshd[32306]: Received disconnect from 45.77.146.50 port 36962:11: Bye Bye [preauth]
Dec 10 06:06:16 lamijardin sshd[32306]: Disconnected from 45.77.146.50 port 36962 [preauth]
Dec 10 06:17:47 lamijardin sshd[32500]: Invalid user vida from 45.77.146.50
Dec 10 06:17:47 lamijardin sshd[32500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.77.146.50
Dec 10 06:17:49 lamijardin sshd[32500]: Failed password for invalid user vida from 45.77.146.50 port 55660 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.77.146.50
2019-12-10 22:09:21
49.0.34.10 attackspam
Dec 10 07:15:42 m3061 sshd[25312]: Did not receive identification string from 49.0.34.10
Dec 10 07:16:53 m3061 sshd[25313]: Invalid user admina from 49.0.34.10
Dec 10 07:16:58 m3061 sshd[25313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.0.34.10


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.0.34.10
2019-12-10 21:45:16
182.46.101.203 attackbotsspam
Dec 10 01:24:55 web1 postfix/smtpd[3384]: warning: unknown[182.46.101.203]: SASL LOGIN authentication failed: authentication failure
...
2019-12-10 22:11:42
13.228.107.58 attackspambots
Dec 10 15:00:18 mail sshd\[20187\]: Invalid user max from 13.228.107.58
Dec 10 15:00:18 mail sshd\[20187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.228.107.58
Dec 10 15:00:20 mail sshd\[20187\]: Failed password for invalid user max from 13.228.107.58 port 42778 ssh2
...
2019-12-10 22:09:56
200.160.111.44 attackspambots
2019-12-10T13:55:20.345622abusebot-8.cloudsearch.cf sshd\[17025\]: Invalid user cgi-3 from 200.160.111.44 port 13339
2019-12-10 22:16:43
136.35.217.7 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 22:03:56

Recently Reported IPs

53.17.5.220 55.41.8.81 187.161.119.232 18.81.144.50
225.118.208.148 73.159.77.29 176.170.117.34 172.77.22.170
215.45.81.10 26.15.35.136 73.191.101.7 146.192.35.159
184.45.178.31 98.148.250.95 119.241.45.192 209.246.70.237
214.45.216.251 48.84.154.69 159.63.173.111 189.236.62.113