Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.135.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.135.40.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 13:23:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 40.135.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.135.144.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.109.144.156 attackspambots
Automatic report - Port Scan Attack
2020-08-21 22:17:47
222.186.30.35 attackbots
21.08.2020 14:24:56 SSH access blocked by firewall
2020-08-21 22:30:24
64.90.63.133 attackspambots
xmlrpc attack
2020-08-21 22:05:32
60.248.199.194 attackbotsspam
Aug 21 13:12:17 game-panel sshd[12143]: Failed password for root from 60.248.199.194 port 47345 ssh2
Aug 21 13:12:59 game-panel sshd[12174]: Failed password for root from 60.248.199.194 port 51541 ssh2
2020-08-21 22:26:00
61.177.172.168 attackbotsspam
Aug 21 10:13:11 NPSTNNYC01T sshd[15194]: Failed password for root from 61.177.172.168 port 58409 ssh2
Aug 21 10:13:23 NPSTNNYC01T sshd[15194]: error: maximum authentication attempts exceeded for root from 61.177.172.168 port 58409 ssh2 [preauth]
Aug 21 10:13:29 NPSTNNYC01T sshd[15231]: Failed password for root from 61.177.172.168 port 18592 ssh2
...
2020-08-21 22:16:31
183.82.99.60 attack
21.08.2020 14:44:49 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-08-21 21:58:14
151.84.135.188 attack
Fail2Ban Ban Triggered
2020-08-21 22:33:39
195.154.174.175 attackspambots
2020-08-21T16:21:28.009664snf-827550 sshd[4423]: Invalid user edwin from 195.154.174.175 port 49680
2020-08-21T16:21:29.857450snf-827550 sshd[4423]: Failed password for invalid user edwin from 195.154.174.175 port 49680 ssh2
2020-08-21T16:26:22.537779snf-827550 sshd[5514]: Invalid user ela from 195.154.174.175 port 39026
...
2020-08-21 21:55:00
45.88.12.72 attackspambots
fail2ban/Aug 21 16:07:02 h1962932 sshd[27252]: Invalid user llq from 45.88.12.72 port 52822
Aug 21 16:07:03 h1962932 sshd[27252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.88.12.72
Aug 21 16:07:02 h1962932 sshd[27252]: Invalid user llq from 45.88.12.72 port 52822
Aug 21 16:07:03 h1962932 sshd[27252]: Failed password for invalid user llq from 45.88.12.72 port 52822 ssh2
Aug 21 16:11:09 h1962932 sshd[27374]: Invalid user Administrator from 45.88.12.72 port 52020
2020-08-21 22:23:24
222.186.169.194 attackbotsspam
Aug 21 13:59:14 124388 sshd[10375]: Failed password for root from 222.186.169.194 port 8934 ssh2
Aug 21 13:59:18 124388 sshd[10375]: Failed password for root from 222.186.169.194 port 8934 ssh2
Aug 21 13:59:22 124388 sshd[10375]: Failed password for root from 222.186.169.194 port 8934 ssh2
Aug 21 13:59:25 124388 sshd[10375]: Failed password for root from 222.186.169.194 port 8934 ssh2
Aug 21 13:59:25 124388 sshd[10375]: error: maximum authentication attempts exceeded for root from 222.186.169.194 port 8934 ssh2 [preauth]
2020-08-21 22:02:30
109.202.17.173 attack
1598011560 - 08/21/2020 14:06:00 Host: 109.202.17.173/109.202.17.173 Port: 445 TCP Blocked
2020-08-21 22:29:40
222.186.175.151 attackspambots
2020-08-21T16:06:49.125822vps773228.ovh.net sshd[27408]: Failed password for root from 222.186.175.151 port 10408 ssh2
2020-08-21T16:06:52.480342vps773228.ovh.net sshd[27408]: Failed password for root from 222.186.175.151 port 10408 ssh2
2020-08-21T16:06:55.878486vps773228.ovh.net sshd[27408]: Failed password for root from 222.186.175.151 port 10408 ssh2
2020-08-21T16:07:01.065171vps773228.ovh.net sshd[27408]: Failed password for root from 222.186.175.151 port 10408 ssh2
2020-08-21T16:07:04.399717vps773228.ovh.net sshd[27408]: Failed password for root from 222.186.175.151 port 10408 ssh2
...
2020-08-21 22:14:23
193.95.24.114 attack
2020-08-21T15:01:39.596181snf-827550 sshd[19296]: Invalid user zero from 193.95.24.114 port 41485
2020-08-21T15:01:41.261381snf-827550 sshd[19296]: Failed password for invalid user zero from 193.95.24.114 port 41485 ssh2
2020-08-21T15:06:12.686282snf-827550 sshd[20932]: Invalid user dev from 193.95.24.114 port 49031
...
2020-08-21 22:15:59
14.8.22.163 attackspam
DATE:2020-08-21 14:06:09, IP:14.8.22.163, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-08-21 22:04:21
178.62.238.152 attackbots
Aug 21 02:56:13 vm1 sshd[8052]: Did not receive identification string from 178.62.238.152 port 38122
Aug 21 02:56:22 vm1 sshd[8053]: Received disconnect from 178.62.238.152 port 44138:11: Normal Shutdown, Thank you for playing [preauth]
Aug 21 02:56:22 vm1 sshd[8053]: Disconnected from 178.62.238.152 port 44138 [preauth]
Aug 21 02:56:35 vm1 sshd[8055]: Invalid user oracle from 178.62.238.152 port 43878
Aug 21 02:56:35 vm1 sshd[8055]: Received disconnect from 178.62.238.152 port 43878:11: Normal Shutdown, Thank you for playing [preauth]
Aug 21 02:56:35 vm1 sshd[8055]: Disconnected from 178.62.238.152 port 43878 [preauth]
Aug 21 02:56:48 vm1 sshd[8057]: Received disconnect from 178.62.238.152 port 43336:11: Normal Shutdown, Thank you for playing [preauth]
Aug 21 02:56:48 vm1 sshd[8057]: Disconnected from 178.62.238.152 port 43336 [preauth]
Aug 21 02:57:02 vm1 sshd[8059]: Invalid user postgres from 178.62.238.152 port 43036
Aug 21 02:57:02 vm1 sshd[8059]: Received disconne........
-------------------------------
2020-08-21 22:07:39

Recently Reported IPs

104.144.135.39 104.144.135.43 104.144.135.52 75.121.142.103
104.144.135.61 104.144.135.81 103.23.19.122 104.144.135.89
103.23.22.248 104.144.135.96 27.114.192.9 104.144.135.98
103.230.234.80 103.230.159.65 103.230.232.81 103.230.235.63
103.230.234.27 103.230.234.208 103.230.234.150 104.144.139.250