Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.140.148.58 attackspam
firewall-block, port(s): 161/udp
2019-09-21 04:37:23
104.140.148.58 attack
Sep 11 14:57:21 localhost kernel: [1966058.443067] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=104.140.148.58 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=245 ID=2495 PROTO=TCP SPT=65325 DPT=987 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 14:57:21 localhost kernel: [1966058.443093] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=104.140.148.58 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=245 ID=2495 PROTO=TCP SPT=65325 DPT=987 SEQ=3815533082 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 OPT (020405B4) 
Sep 11 14:59:52 localhost kernel: [1966209.518449] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=104.140.148.58 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=245 ID=43417 PROTO=TCP SPT=64300 DPT=5910 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 14:59:52 localhost kernel: [1966209.518469] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=104.140.148.58 DST=[mungedIP2] LEN=4
2019-09-12 03:13:24
104.140.148.58 attackspam
23.08.2019 20:09:25 Connection to port 21 blocked by firewall
2019-08-24 04:38:34
104.140.148.58 attackbotsspam
Automatic report - Port Scan Attack
2019-07-30 03:10:28
104.140.148.58 attackbots
8444/tcp 21/tcp 5900/tcp...
[2019-06-13/07-24]35pkt,13pt.(tcp),1pt.(udp)
2019-07-26 11:47:12
104.140.148.58 attackbotsspam
" "
2019-07-25 06:38:18
104.140.148.58 attackspambots
22.07.2019 18:53:41 Connection to port 3306 blocked by firewall
2019-07-23 05:55:25
104.140.148.58 attackbots
RDP brute force attack detected by fail2ban
2019-07-18 14:04:36
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       104.140.0.0 - 104.140.255.255
CIDR:           104.140.0.0/16
NetName:        EONIX
NetHandle:      NET-104-140-0-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Eonix Corporation (EONIX)
RegDate:        2014-06-20
Updated:        2019-02-28
Comment:        Please use the below contact information to report suspected security issues specific to traffic emanating from net blocks in this range, including the distribution of malicious content or other illicit or illegal material.
Comment:        
Comment:        For SPAM and other abuse issues, please contact: 
Comment:        * net-abuse@eonix.net 
Comment:        
Comment:        For legal and law enforcement-related requests, please contact: 
Comment:        * legal@eonix.net 
Comment:        
Comment:        For Routing, Peering or DNS issues, please contact:
Comment:        * noc@eonix.net
Ref:            https://rdap.arin.net/registry/ip/104.140.0.0


OrgName:        Eonix Corporation
OrgId:          EONIX
Address:        9107 W Russell Rd Suite 100
City:           Las Vegas
StateProv:      NV
PostalCode:     89148
Country:        US
RegDate:        2006-05-31
Updated:        2025-10-16
Comment:        Please use the below contact information to report suspected security issues specific to traffic emanating from net blocks in this range, including the distribution of malicious content or other illicit or illegal material.
Comment:        
Comment:        For SPAM and other abuse issues, please contact: 
Comment:        * net-abuse@eonix.net 
Comment:        
Comment:        For legal and law enforcement-related requests, please contact: 
Comment:        * legal@eonix.net 
Comment:        
Comment:        For Routing, Peering or DNS issues, please contact:
Comment:        * noc@eonix.net
Ref:            https://rdap.arin.net/registry/entity/EONIX


OrgAbuseHandle: NTS22-ARIN
OrgAbuseName:   Network Trust and Safety
OrgAbusePhone:  +1-702-605-2981 
OrgAbuseEmail:  net-admin@eonix.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NTS22-ARIN

OrgNOCHandle: NOC31884-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-702-605-2981 
OrgNOCEmail:  noc@eonix.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC31884-ARIN

OrgTechHandle: EDM7-ARIN
OrgTechName:   Eonix DNS Management 
OrgTechPhone:  +1-877-841-3341 
OrgTechEmail:  902214@serverhub.com
OrgTechRef:    https://rdap.arin.net/registry/entity/EDM7-ARIN

OrgAbuseHandle: NTS29-ARIN
OrgAbuseName:   Network Trust and Safety
OrgAbusePhone:  +1-702-605-2981 
OrgAbuseEmail:  net-admin@eonix.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NTS29-ARIN

OrgDNSHandle: EDM7-ARIN
OrgDNSName:   Eonix DNS Management 
OrgDNSPhone:  +1-877-841-3341 
OrgDNSEmail:  902214@serverhub.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/EDM7-ARIN

OrgTechHandle: NOC31884-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-702-605-2981 
OrgTechEmail:  noc@eonix.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC31884-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.140.148.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4174
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.140.148.114.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042902 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 07:00:57 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 114.148.140.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.148.140.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.190 attackspam
2019-10-16T01:20:17.853461+02:00 lumpi kernel: [1004027.347247] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=47014 PROTO=TCP SPT=48732 DPT=9327 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-16 07:44:57
49.232.23.127 attack
Oct 15 21:50:31 meumeu sshd[8100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.23.127 
Oct 15 21:50:33 meumeu sshd[8100]: Failed password for invalid user ghost from 49.232.23.127 port 42524 ssh2
Oct 15 21:54:28 meumeu sshd[8777]: Failed password for root from 49.232.23.127 port 46220 ssh2
...
2019-10-16 07:30:34
178.128.169.88 attack
miraniessen.de 178.128.169.88 \[15/Oct/2019:21:53:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 5974 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
miraniessen.de 178.128.169.88 \[15/Oct/2019:21:53:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 5974 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-16 07:39:19
101.255.36.146 attack
" "
2019-10-16 07:25:12
222.186.173.142 attack
Oct 16 01:26:47 MK-Soft-VM7 sshd[9350]: Failed password for root from 222.186.173.142 port 15460 ssh2
Oct 16 01:26:52 MK-Soft-VM7 sshd[9350]: Failed password for root from 222.186.173.142 port 15460 ssh2
...
2019-10-16 07:34:42
52.178.142.12 attackspam
Multiple failed RDP login attempts
2019-10-16 07:46:09
159.65.112.93 attackspambots
Oct 15 12:06:48 hpm sshd\[1598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93  user=root
Oct 15 12:06:50 hpm sshd\[1598\]: Failed password for root from 159.65.112.93 port 45682 ssh2
Oct 15 12:10:41 hpm sshd\[2017\]: Invalid user pbb from 159.65.112.93
Oct 15 12:10:41 hpm sshd\[2017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93
Oct 15 12:10:43 hpm sshd\[2017\]: Failed password for invalid user pbb from 159.65.112.93 port 56156 ssh2
2019-10-16 07:44:13
58.213.105.2 attackspambots
10/15/2019-15:53:25.173328 58.213.105.2 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-16 07:51:50
106.52.234.176 attackbots
2019-10-15T20:03:45.716655mizuno.rwx.ovh sshd[1319568]: Connection from 106.52.234.176 port 36920 on 78.46.61.178 port 22
2019-10-15T20:03:47.137440mizuno.rwx.ovh sshd[1319568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.234.176  user=root
2019-10-15T20:03:49.017896mizuno.rwx.ovh sshd[1319568]: Failed password for root from 106.52.234.176 port 36920 ssh2
2019-10-15T20:18:21.513504mizuno.rwx.ovh sshd[1321395]: Connection from 106.52.234.176 port 53614 on 78.46.61.178 port 22
2019-10-15T20:18:23.326223mizuno.rwx.ovh sshd[1321395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.234.176  user=root
2019-10-15T20:18:25.271619mizuno.rwx.ovh sshd[1321395]: Failed password for root from 106.52.234.176 port 53614 ssh2
...
2019-10-16 07:37:17
118.107.233.29 attackspambots
Oct 16 01:02:28 bouncer sshd\[17573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.107.233.29  user=root
Oct 16 01:02:30 bouncer sshd\[17573\]: Failed password for root from 118.107.233.29 port 38454 ssh2
Oct 16 01:06:41 bouncer sshd\[17592\]: Invalid user navis from 118.107.233.29 port 48036
...
2019-10-16 07:27:48
212.129.128.249 attackspam
2019-10-15T23:09:08.867954abusebot-5.cloudsearch.cf sshd\[11900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.128.249  user=root
2019-10-16 07:32:30
27.84.166.140 attack
fail2ban
2019-10-16 07:36:22
49.234.28.54 attack
Oct 15 13:43:10 php1 sshd\[29723\]: Invalid user hhhhh from 49.234.28.54
Oct 15 13:43:10 php1 sshd\[29723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54
Oct 15 13:43:12 php1 sshd\[29723\]: Failed password for invalid user hhhhh from 49.234.28.54 port 35950 ssh2
Oct 15 13:47:48 php1 sshd\[30088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54  user=root
Oct 15 13:47:50 php1 sshd\[30088\]: Failed password for root from 49.234.28.54 port 46404 ssh2
2019-10-16 07:51:22
58.199.164.240 attackbots
2019-10-15T23:13:32.087972abusebot-5.cloudsearch.cf sshd\[11935\]: Invalid user team from 58.199.164.240 port 36244
2019-10-16 07:45:58
114.67.80.39 attackspam
$f2bV_matches
2019-10-16 07:30:20

Recently Reported IPs

2606:4700:10::6814:5191 8.209.236.13 11.160.180.51 17.49.253.7
43.98.184.89 43.98.204.186 207.127.35.7 151.109.0.57
151.89.90.137 121.199.173.43 185.226.197.7 185.226.197.8
176.65.132.43 162.216.150.105 80.96.113.206 14.207.194.26
2606:4700:10::6814:9345 2606:4700:10::6814:8168 51.102.248.238 148.224.25.43