Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Elgin

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.140.228.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.140.228.142.		IN	A

;; AUTHORITY SECTION:
.			338	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 17:50:39 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 142.228.140.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 104.140.228.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
54.36.182.244 attack
2020-02-21T11:18:46.175831  sshd[10820]: Invalid user live from 54.36.182.244 port 60359
2020-02-21T11:18:46.186882  sshd[10820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.182.244
2020-02-21T11:18:46.175831  sshd[10820]: Invalid user live from 54.36.182.244 port 60359
2020-02-21T11:18:48.558975  sshd[10820]: Failed password for invalid user live from 54.36.182.244 port 60359 ssh2
...
2020-02-21 18:25:57
138.197.89.194 attackspambots
SSH bruteforce
2020-02-21 18:25:10
116.218.131.185 attackspam
Lines containing failures of 116.218.131.185
Feb 21 05:47:23 shared10 sshd[6042]: Invalid user ubuntu from 116.218.131.185 port 20124
Feb 21 05:47:23 shared10 sshd[6042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.218.131.185
Feb 21 05:47:24 shared10 sshd[6042]: Failed password for invalid user ubuntu from 116.218.131.185 port 20124 ssh2
Feb 21 05:47:25 shared10 sshd[6042]: Received disconnect from 116.218.131.185 port 20124:11: Bye Bye [preauth]
Feb 21 05:47:25 shared10 sshd[6042]: Disconnected from invalid user ubuntu 116.218.131.185 port 20124 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.218.131.185
2020-02-21 18:31:25
5.29.191.195 attackbots
Feb 20 22:14:03 kapalua sshd\[15474\]: Invalid user debian from 5.29.191.195
Feb 20 22:14:03 kapalua sshd\[15474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.29.191.195
Feb 20 22:14:06 kapalua sshd\[15474\]: Failed password for invalid user debian from 5.29.191.195 port 46960 ssh2
Feb 20 22:21:47 kapalua sshd\[16060\]: Invalid user eisp from 5.29.191.195
Feb 20 22:21:47 kapalua sshd\[16060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.29.191.195
2020-02-21 18:08:18
103.80.55.19 attack
$f2bV_matches
2020-02-21 18:37:27
51.83.42.108 attackspam
Invalid user rabbitmq from 51.83.42.108 port 54884
2020-02-21 18:29:30
188.240.220.58 attack
Fail2Ban Ban Triggered
2020-02-21 18:20:02
140.143.226.19 attackbotsspam
Feb 21 10:32:34 MK-Soft-Root2 sshd[15006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.226.19 
Feb 21 10:32:36 MK-Soft-Root2 sshd[15006]: Failed password for invalid user web from 140.143.226.19 port 46010 ssh2
...
2020-02-21 18:23:23
51.161.11.135 attack
Lines containing failures of 51.161.11.135
Feb 20 10:02:27 neweola sshd[14708]: Invalid user nagios from 51.161.11.135 port 53304
Feb 20 10:02:27 neweola sshd[14708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.11.135 
Feb 20 10:02:30 neweola sshd[14708]: Failed password for invalid user nagios from 51.161.11.135 port 53304 ssh2
Feb 20 10:02:32 neweola sshd[14708]: Received disconnect from 51.161.11.135 port 53304:11: Bye Bye [preauth]
Feb 20 10:02:32 neweola sshd[14708]: Disconnected from invalid user nagios 51.161.11.135 port 53304 [preauth]
Feb 20 10:25:10 neweola sshd[15419]: Invalid user vmail from 51.161.11.135 port 34108
Feb 20 10:25:10 neweola sshd[15419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.11.135 
Feb 20 10:25:13 neweola sshd[15419]: Failed password for invalid user vmail from 51.161.11.135 port 34108 ssh2
Feb 20 10:25:14 neweola sshd[15419]: Received d........
------------------------------
2020-02-21 18:43:51
122.51.71.156 attack
Feb 21 08:24:35 lnxded64 sshd[11664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.71.156
2020-02-21 18:13:15
190.185.131.3 attackbots
Port probing on unauthorized port 8080
2020-02-21 18:33:18
139.59.94.225 attack
$f2bV_matches
2020-02-21 18:27:55
189.7.65.142 attackbots
Feb 21 08:59:46 server sshd\[8446\]: Invalid user a from 189.7.65.142
Feb 21 08:59:46 server sshd\[8446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.65.142 
Feb 21 08:59:48 server sshd\[8446\]: Failed password for invalid user a from 189.7.65.142 port 37492 ssh2
Feb 21 09:23:01 server sshd\[12491\]: Invalid user cpanelrrdtool from 189.7.65.142
Feb 21 09:23:01 server sshd\[12491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.65.142 
...
2020-02-21 18:04:15
159.89.144.7 attackspambots
Automatic report - XMLRPC Attack
2020-02-21 18:16:15
184.82.14.137 attackbots
Unauthorized connection attempt detected from IP address 184.82.14.137 to port 445
2020-02-21 18:39:18

Recently Reported IPs

104.140.185.13 104.140.240.73 104.143.34.139 104.143.46.122
104.144.129.170 104.144.147.115 104.144.169.166 104.144.173.70
104.144.194.242 104.144.205.115 104.144.225.16 104.144.225.222
104.144.233.82 104.144.235.67 104.144.248.216 104.144.51.16
104.144.78.24 104.144.78.76 104.144.87.212 104.144.99.128