Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.144.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13765
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.144.219.		IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 291 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:21:52 CST 2022
;; MSG SIZE  rcvd: 108
Host info
219.144.144.104.in-addr.arpa domain name pointer 219.144.144.104.in-addr.arpa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.144.144.104.in-addr.arpa	name = 219.144.144.104.in-addr.arpa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.133.34.171 attackbots
Nov  7 17:43:16 server sshd\[11343\]: Invalid user qv from 109.133.34.171
Nov  7 17:43:16 server sshd\[11343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.133.34.171 
Nov  7 17:43:18 server sshd\[11343\]: Failed password for invalid user qv from 109.133.34.171 port 52026 ssh2
Nov  7 17:43:32 server sshd\[11383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.133.34.171  user=root
Nov  7 17:43:34 server sshd\[11383\]: Failed password for root from 109.133.34.171 port 53990 ssh2
...
2019-11-08 03:36:36
37.215.90.149 attack
Nov  7 15:28:55 tamoto postfix/smtpd[6881]: connect from mm-149-90-215-37.mfilial.dynamic.pppoe.byfly.by[37.215.90.149]
Nov  7 15:28:56 tamoto postfix/smtpd[6881]: warning: mm-149-90-215-37.mfilial.dynamic.pppoe.byfly.by[37.215.90.149]: SASL CRAM-MD5 authentication failed: authentication failure
Nov  7 15:28:56 tamoto postfix/smtpd[6881]: warning: mm-149-90-215-37.mfilial.dynamic.pppoe.byfly.by[37.215.90.149]: SASL PLAIN authentication failed: authentication failure
Nov  7 15:28:57 tamoto postfix/smtpd[6881]: warning: mm-149-90-215-37.mfilial.dynamic.pppoe.byfly.by[37.215.90.149]: SASL LOGIN authentication failed: authentication failure
Nov  7 15:28:57 tamoto postfix/smtpd[6881]: disconnect from mm-149-90-215-37.mfilial.dynamic.pppoe.byfly.by[37.215.90.149]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.215.90.149
2019-11-08 03:23:57
5.17.172.106 attackspam
2019-11-07T16:29:09.608249abusebot-5.cloudsearch.cf sshd\[21534\]: Invalid user admin from 5.17.172.106 port 21512
2019-11-08 03:43:12
159.89.184.25 attackbots
Automatic report - XMLRPC Attack
2019-11-08 03:46:38
222.186.175.155 attackspam
2019-11-07T19:35:17.517768hub.schaetter.us sshd\[24149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
2019-11-07T19:35:19.748583hub.schaetter.us sshd\[24149\]: Failed password for root from 222.186.175.155 port 14308 ssh2
2019-11-07T19:35:23.986835hub.schaetter.us sshd\[24149\]: Failed password for root from 222.186.175.155 port 14308 ssh2
2019-11-07T19:35:28.434263hub.schaetter.us sshd\[24149\]: Failed password for root from 222.186.175.155 port 14308 ssh2
2019-11-07T19:35:32.987736hub.schaetter.us sshd\[24149\]: Failed password for root from 222.186.175.155 port 14308 ssh2
...
2019-11-08 03:37:06
148.66.142.135 attack
SSH Brute Force, server-1 sshd[23907]: Failed password for invalid user pkjain from 148.66.142.135 port 58322 ssh2
2019-11-08 03:28:00
94.191.28.88 attackbots
Nov  7 04:36:11 tdfoods sshd\[8752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.28.88  user=root
Nov  7 04:36:13 tdfoods sshd\[8752\]: Failed password for root from 94.191.28.88 port 43386 ssh2
Nov  7 04:43:12 tdfoods sshd\[9427\]: Invalid user ts2 from 94.191.28.88
Nov  7 04:43:12 tdfoods sshd\[9427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.28.88
Nov  7 04:43:13 tdfoods sshd\[9427\]: Failed password for invalid user ts2 from 94.191.28.88 port 50482 ssh2
2019-11-08 03:52:43
106.248.49.62 attackbots
Nov  7 18:26:16 v22018076622670303 sshd\[30819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.49.62  user=root
Nov  7 18:26:18 v22018076622670303 sshd\[30819\]: Failed password for root from 106.248.49.62 port 40189 ssh2
Nov  7 18:30:22 v22018076622670303 sshd\[30841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.49.62  user=root
...
2019-11-08 03:16:18
189.3.253.34 attack
Automatic report - Port Scan Attack
2019-11-08 03:40:34
78.161.96.90 attackspam
Nov  7 14:35:39 sanyalnet-cloud-vps4 sshd[19691]: Connection from 78.161.96.90 port 35956 on 64.137.160.124 port 22
Nov  7 14:35:55 sanyalnet-cloud-vps4 sshd[19693]: Connection from 78.161.96.90 port 35972 on 64.137.160.124 port 22
Nov  7 14:36:05 sanyalnet-cloud-vps4 sshd[19691]: Address 78.161.96.90 maps to 78.161.96.90.dynamic.ttnet.com.tr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov  7 14:36:05 sanyalnet-cloud-vps4 sshd[19691]: User r.r from 78.161.96.90 not allowed because not listed in AllowUsers
Nov  7 14:36:05 sanyalnet-cloud-vps4 sshd[19691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.161.96.90  user=r.r
Nov  7 14:36:06 sanyalnet-cloud-vps4 sshd[19691]: Failed password for invalid user r.r from 78.161.96.90 port 35956 ssh2
Nov  7 14:36:06 sanyalnet-cloud-vps4 sshd[19691]: Received disconnect from 78.161.96.90: 11: disconnected by user [preauth]
Nov  7 14:36:10 sanyalnet-cloud-vps4 ss........
-------------------------------
2019-11-08 03:46:56
178.128.158.113 attackspambots
SSH Brute Force, server-1 sshd[22045]: Failed password for mysql from 178.128.158.113 port 52992 ssh2
2019-11-08 03:22:33
122.14.219.4 attackbots
Nov  7 07:47:55 hpm sshd\[22991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.219.4  user=root
Nov  7 07:47:57 hpm sshd\[22991\]: Failed password for root from 122.14.219.4 port 37160 ssh2
Nov  7 07:52:32 hpm sshd\[23398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.219.4  user=root
Nov  7 07:52:34 hpm sshd\[23398\]: Failed password for root from 122.14.219.4 port 43476 ssh2
Nov  7 07:57:08 hpm sshd\[23774\]: Invalid user chandru from 122.14.219.4
2019-11-08 03:33:17
157.52.255.176 attack
Nov  7 15:33:36 mxgate1 postfix/postscreen[538]: CONNECT from [157.52.255.176]:34845 to [176.31.12.44]:25
Nov  7 15:33:36 mxgate1 postfix/dnsblog[1044]: addr 157.52.255.176 listed by domain zen.spamhaus.org as 127.0.0.3
Nov  7 15:33:42 mxgate1 postfix/postscreen[538]: DNSBL rank 2 for [157.52.255.176]:34845
Nov x@x
Nov  7 15:33:43 mxgate1 postfix/postscreen[538]: DISCONNECT [157.52.255.176]:34845


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.52.255.176
2019-11-08 03:38:20
106.12.134.23 attackbots
Nov  7 14:10:15 plusreed sshd[3350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.134.23  user=root
Nov  7 14:10:16 plusreed sshd[3350]: Failed password for root from 106.12.134.23 port 36082 ssh2
Nov  7 14:14:20 plusreed sshd[4230]: Invalid user edineide from 106.12.134.23
Nov  7 14:14:20 plusreed sshd[4230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.134.23
Nov  7 14:14:20 plusreed sshd[4230]: Invalid user edineide from 106.12.134.23
Nov  7 14:14:23 plusreed sshd[4230]: Failed password for invalid user edineide from 106.12.134.23 port 16265 ssh2
...
2019-11-08 03:29:36
63.80.184.116 attackspambots
2019-11-07T15:57:03.847446stark.klein-stark.info postfix/smtpd\[15590\]: NOQUEUE: reject: RCPT from doubt.sapuxfiori.com\[63.80.184.116\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
...
2019-11-08 03:13:14

Recently Reported IPs

104.144.144.224 104.144.144.213 104.144.144.211 104.144.144.155
104.144.144.238 104.144.144.54 104.144.144.221 104.144.144.50
104.144.144.78 104.144.144.95 104.144.144.86 104.144.145.220
104.144.146.10 104.144.145.191 104.144.146.113 104.144.146.119
104.144.146.103 104.144.146.129 104.144.146.101 104.144.145.53