Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Buffalo

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.146.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.146.219.		IN	A

;; AUTHORITY SECTION:
.			192	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 10:53:44 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 219.146.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.146.144.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.129.65.22 attackbotsspam
Invalid user user from 122.129.65.22 port 53450
2020-01-10 23:44:05
129.226.174.139 attack
Invalid user student from 129.226.174.139 port 57270
2020-01-10 23:43:04
84.201.162.151 attack
Jan 10 04:31:50 auw2 sshd\[20831\]: Invalid user ftpuser from 84.201.162.151
Jan 10 04:31:50 auw2 sshd\[20831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.162.151
Jan 10 04:31:52 auw2 sshd\[20831\]: Failed password for invalid user ftpuser from 84.201.162.151 port 43888 ssh2
Jan 10 04:33:45 auw2 sshd\[20978\]: Invalid user ubuntu from 84.201.162.151
Jan 10 04:33:45 auw2 sshd\[20978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.162.151
2020-01-10 23:22:27
51.144.160.217 attackbots
Automatic report - Banned IP Access
2020-01-10 23:27:50
51.254.51.182 attackspam
...
2020-01-10 23:27:22
14.233.159.24 attackspam
Invalid user user from 14.233.159.24 port 63266
2020-01-10 23:53:28
106.12.74.141 attackspam
Invalid user nd from 106.12.74.141 port 48526
2020-01-10 23:17:29
59.90.234.180 attackbotsspam
SSH bruteforce
2020-01-10 23:25:31
177.183.47.97 attackspambots
Port scan on 1 port(s): 22
2020-01-10 23:40:15
110.12.8.10 attackspam
Jan  9 14:35:29 tuxlinux sshd[47044]: Invalid user icinga from 110.12.8.10 port 63663
Jan  9 14:35:29 tuxlinux sshd[47044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.12.8.10 
Jan  9 14:35:29 tuxlinux sshd[47044]: Invalid user icinga from 110.12.8.10 port 63663
Jan  9 14:35:29 tuxlinux sshd[47044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.12.8.10 
Jan  9 14:35:29 tuxlinux sshd[47044]: Invalid user icinga from 110.12.8.10 port 63663
Jan  9 14:35:29 tuxlinux sshd[47044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.12.8.10 
Jan  9 14:35:31 tuxlinux sshd[47044]: Failed password for invalid user icinga from 110.12.8.10 port 63663 ssh2
...
2020-01-10 23:45:28
222.186.15.166 attack
Unauthorized connection attempt detected from IP address 222.186.15.166 to port 22 [T]
2020-01-10 23:38:22
14.215.176.152 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-01-10 23:34:42
211.75.194.80 attackspam
Jan 10 16:20:14 * sshd[7386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.80
Jan 10 16:20:16 * sshd[7386]: Failed password for invalid user setup from 211.75.194.80 port 37614 ssh2
2020-01-10 23:38:39
37.228.117.99 attackbots
Invalid user qc from 37.228.117.99 port 47784
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.117.99
Failed password for invalid user qc from 37.228.117.99 port 47784 ssh2
Invalid user sgi from 37.228.117.99 port 41248
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.117.99
2020-01-10 23:31:07
23.95.122.232 attackbots
Invalid user appadmin from 23.95.122.232 port 50408
2020-01-10 23:34:18

Recently Reported IPs

104.144.146.150 82.5.37.158 104.144.146.223 104.144.146.229
104.144.146.24 104.144.146.28 104.144.146.31 104.144.146.33
104.144.146.7 104.144.146.70 104.144.147.122 104.144.147.239
104.144.147.67 104.144.148.215 104.144.15.82 104.144.153.135
51.83.181.99 104.144.153.235 104.144.155.46 41.224.249.211