Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.147.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.147.106.		IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 06:14:44 CST 2022
;; MSG SIZE  rcvd: 108
Host info
106.147.144.104.in-addr.arpa domain name pointer shipping.lgoodspoekrhic.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.147.144.104.in-addr.arpa	name = shipping.lgoodspoekrhic.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.38.192.96 attack
Dec 20 02:23:22 TORMINT sshd\[32503\]: Invalid user powiat from 54.38.192.96
Dec 20 02:23:22 TORMINT sshd\[32503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.192.96
Dec 20 02:23:24 TORMINT sshd\[32503\]: Failed password for invalid user powiat from 54.38.192.96 port 40064 ssh2
...
2019-12-20 19:54:08
90.113.236.148 attack
Unauthorized access to SSH at 20/Dec/2019:11:21:10 +0000.
2019-12-20 20:08:38
40.92.65.62 attack
Dec 20 09:24:52 debian-2gb-vpn-nbg1-1 kernel: [1201452.546469] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.65.62 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=14473 DF PROTO=TCP SPT=50560 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-20 20:33:12
185.232.67.8 attackbotsspam
--- report ---
Dec 20 09:08:02 sshd: Connection from 185.232.67.8 port 48930
Dec 20 09:08:26 sshd: Invalid user admin from 185.232.67.8
Dec 20 09:08:28 sshd: Failed password for invalid user admin from 185.232.67.8 port 48930 ssh2
2019-12-20 20:15:02
14.171.42.222 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 06:25:11.
2019-12-20 20:11:12
122.51.167.241 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-12-20 20:10:38
198.98.59.29 attackbots
Dec 20 11:48:57 marvibiene sshd[19770]: Invalid user admin from 198.98.59.29 port 59249
Dec 20 11:48:57 marvibiene sshd[19770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.59.29
Dec 20 11:48:57 marvibiene sshd[19770]: Invalid user admin from 198.98.59.29 port 59249
Dec 20 11:49:00 marvibiene sshd[19770]: Failed password for invalid user admin from 198.98.59.29 port 59249 ssh2
...
2019-12-20 20:08:15
51.83.254.106 attack
Dec 20 11:49:51 tuxlinux sshd[16370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.254.106  user=root
Dec 20 11:49:53 tuxlinux sshd[16370]: Failed password for root from 51.83.254.106 port 56918 ssh2
Dec 20 11:49:51 tuxlinux sshd[16370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.254.106  user=root
Dec 20 11:49:53 tuxlinux sshd[16370]: Failed password for root from 51.83.254.106 port 56918 ssh2
Dec 20 12:03:10 tuxlinux sshd[16627]: Invalid user hidekoba from 51.83.254.106 port 55976
...
2019-12-20 20:09:10
202.163.126.134 attackspam
SSH Brute-Forcing (server2)
2019-12-20 20:15:55
190.64.64.74 attack
Dec 20 10:45:36 ns41 sshd[2758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.64.74
2019-12-20 20:20:38
117.193.96.85 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 06:25:11.
2019-12-20 20:10:54
104.131.52.16 attackbots
Dec 20 01:43:58 eddieflores sshd\[17756\]: Invalid user fox from 104.131.52.16
Dec 20 01:43:58 eddieflores sshd\[17756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.52.16
Dec 20 01:43:59 eddieflores sshd\[17756\]: Failed password for invalid user fox from 104.131.52.16 port 53184 ssh2
Dec 20 01:49:25 eddieflores sshd\[18299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.52.16  user=root
Dec 20 01:49:28 eddieflores sshd\[18299\]: Failed password for root from 104.131.52.16 port 56875 ssh2
2019-12-20 19:57:55
62.28.34.125 attackspambots
Dec 20 13:14:02 legacy sshd[6561]: Failed password for sshd from 62.28.34.125 port 5665 ssh2
Dec 20 13:21:51 legacy sshd[6806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125
Dec 20 13:21:53 legacy sshd[6806]: Failed password for invalid user admin1 from 62.28.34.125 port 5815 ssh2
...
2019-12-20 20:23:44
91.240.65.10 attack
TCP Port Scanning
2019-12-20 20:31:44
40.92.20.48 attackbots
Dec 20 09:25:12 debian-2gb-vpn-nbg1-1 kernel: [1201471.692250] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.20.48 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=31527 DF PROTO=TCP SPT=53528 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-20 20:13:35

Recently Reported IPs

104.144.146.191 104.144.147.76 104.144.152.41 104.144.16.159
104.144.16.214 104.144.16.97 104.144.160.124 104.144.160.134
104.144.160.158 104.144.160.195 104.144.160.205 104.144.160.227
226.81.91.59 104.144.161.68 104.144.162.66 104.144.164.101
104.144.164.129 104.144.164.142 104.144.164.50 104.144.164.69