Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Buffalo

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.146.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.146.114.		IN	A

;; AUTHORITY SECTION:
.			224	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040402 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 05 18:50:27 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 114.146.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.146.144.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.227.202 attackbots
Unauthorized connection attempt detected from IP address 37.49.227.202 to port 81 [J]
2020-01-16 13:00:31
206.189.40.187 attackspam
Unauthorized connection attempt detected from IP address 206.189.40.187 to port 2220 [J]
2020-01-16 13:28:37
220.134.218.112 attackspam
Unauthorized connection attempt detected from IP address 220.134.218.112 to port 2220 [J]
2020-01-16 13:35:30
91.121.16.153 attackspambots
(sshd) Failed SSH login from 91.121.16.153 (FR/France/ns38725.ovh.net): 5 in the last 3600 secs
2020-01-16 13:00:07
106.51.138.172 attackspambots
Unauthorized connection attempt detected from IP address 106.51.138.172 to port 2220 [J]
2020-01-16 13:00:59
222.186.169.194 attackbotsspam
Jan 16 06:00:28 dcd-gentoo sshd[15597]: User root from 222.186.169.194 not allowed because none of user's groups are listed in AllowGroups
Jan 16 06:00:31 dcd-gentoo sshd[15597]: error: PAM: Authentication failure for illegal user root from 222.186.169.194
Jan 16 06:00:28 dcd-gentoo sshd[15597]: User root from 222.186.169.194 not allowed because none of user's groups are listed in AllowGroups
Jan 16 06:00:31 dcd-gentoo sshd[15597]: error: PAM: Authentication failure for illegal user root from 222.186.169.194
Jan 16 06:00:28 dcd-gentoo sshd[15597]: User root from 222.186.169.194 not allowed because none of user's groups are listed in AllowGroups
Jan 16 06:00:31 dcd-gentoo sshd[15597]: error: PAM: Authentication failure for illegal user root from 222.186.169.194
Jan 16 06:00:31 dcd-gentoo sshd[15597]: Failed keyboard-interactive/pam for invalid user root from 222.186.169.194 port 59262 ssh2
...
2020-01-16 13:03:32
222.186.30.31 attackspambots
Jan 16 06:03:26 v22018076622670303 sshd\[804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.31  user=root
Jan 16 06:03:28 v22018076622670303 sshd\[804\]: Failed password for root from 222.186.30.31 port 18902 ssh2
Jan 16 06:03:30 v22018076622670303 sshd\[804\]: Failed password for root from 222.186.30.31 port 18902 ssh2
...
2020-01-16 13:10:18
15.200.76.48 attackspambots
Unauthorized connection attempt detected from IP address 15.200.76.48 to port 2220 [J]
2020-01-16 13:34:53
222.186.31.127 attackspam
Jan 16 05:55:48 localhost sshd\[13059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.127  user=root
Jan 16 05:55:50 localhost sshd\[13059\]: Failed password for root from 222.186.31.127 port 11105 ssh2
Jan 16 05:55:53 localhost sshd\[13059\]: Failed password for root from 222.186.31.127 port 11105 ssh2
2020-01-16 13:06:43
180.163.220.41 attackbotsspam
Jan 16 05:55:26 debian-2gb-nbg1-2 kernel: \[1409822.891198\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=180.163.220.41 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=54321 PROTO=TCP SPT=62274 DPT=17998 WINDOW=65535 RES=0x00 SYN URGP=0
2020-01-16 13:26:22
114.46.29.156 attackbots
Telnet Server BruteForce Attack
2020-01-16 13:08:19
23.95.102.185 attackspam
(From wilsondsusan07@gmail.com) Hi there!

I was just browsing on your website, and I saw that it can do better in attracting more clients. Keeping up with modern trends on web design is crucial to be ahead of your competitors. If you've been seeking an expert to upgrade your website or create a totally new one, then I can definitely help you out for a cheap cost. 

I'm a freelance web designer who won't only make your website more user-friendly; I'll also help your business grow. I'd really like to discuss some awesome ideas that I have. Please write back to inform me about when you'll have some free time for a complimentary consultation, so we can get started. Talk to you soon.

Thank you,
Susan Wilson
2020-01-16 13:11:22
222.186.175.147 attackspam
Jan 16 06:37:43 markkoudstaal sshd[1152]: Failed password for root from 222.186.175.147 port 46744 ssh2
Jan 16 06:37:46 markkoudstaal sshd[1152]: Failed password for root from 222.186.175.147 port 46744 ssh2
Jan 16 06:37:49 markkoudstaal sshd[1152]: Failed password for root from 222.186.175.147 port 46744 ssh2
Jan 16 06:37:52 markkoudstaal sshd[1152]: Failed password for root from 222.186.175.147 port 46744 ssh2
2020-01-16 13:39:37
2001:bc8:c04f::1:18 attackspambots
C1,WP GET /suche/wp-login.php
2020-01-16 13:26:36
149.90.109.127 attackspam
Unauthorized connection attempt detected from IP address 149.90.109.127 to port 2220 [J]
2020-01-16 13:27:42

Recently Reported IPs

104.144.144.94 104.144.146.125 104.144.146.226 104.144.146.27
104.144.146.68 154.61.71.52 104.144.159.174 104.144.16.100
104.144.16.11 104.144.16.233 104.144.16.25 104.144.16.65
104.144.16.76 104.144.160.179 104.144.160.208 104.144.160.242
104.144.160.28 104.144.160.56 104.144.162.102 104.144.162.140