Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boston

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.235.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.235.139.		IN	A

;; AUTHORITY SECTION:
.			308	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032602 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 27 08:46:01 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 139.235.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.235.144.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.92.35.127 attackspambots
Aug  4 01:14:35 NPSTNNYC01T sshd[7013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.35.127
Aug  4 01:14:38 NPSTNNYC01T sshd[7013]: Failed password for invalid user Pass@word1 from 120.92.35.127 port 46706 ssh2
Aug  4 01:19:59 NPSTNNYC01T sshd[7861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.35.127
...
2020-08-04 15:00:00
138.68.24.88 attackspambots
Aug  3 21:13:03 web9 sshd\[15456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.24.88  user=root
Aug  3 21:13:05 web9 sshd\[15456\]: Failed password for root from 138.68.24.88 port 40858 ssh2
Aug  3 21:17:22 web9 sshd\[16063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.24.88  user=root
Aug  3 21:17:24 web9 sshd\[16063\]: Failed password for root from 138.68.24.88 port 52694 ssh2
Aug  3 21:21:23 web9 sshd\[16671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.24.88  user=root
2020-08-04 15:34:59
45.129.33.10 attackspambots
08/04/2020-02:53:32.604829 45.129.33.10 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-08-04 15:04:00
149.202.162.73 attack
*Port Scan* detected from 149.202.162.73 (FR/France/Hauts-de-France/Gravelines/-). 4 hits in the last 195 seconds
2020-08-04 15:06:21
61.133.232.252 attackspam
Aug  4 06:36:08 rancher-0 sshd[759180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.252  user=root
Aug  4 06:36:10 rancher-0 sshd[759180]: Failed password for root from 61.133.232.252 port 55393 ssh2
...
2020-08-04 15:17:42
182.156.216.51 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-04T05:03:38Z and 2020-08-04T05:23:01Z
2020-08-04 15:16:56
46.39.194.129 attackspambots
Automatic report - Port Scan Attack
2020-08-04 15:25:21
165.22.122.246 attackbotsspam
Lines containing failures of 165.22.122.246
Aug  3 14:22:14 MAKserver06 sshd[26410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.122.246  user=r.r
Aug  3 14:22:16 MAKserver06 sshd[26410]: Failed password for r.r from 165.22.122.246 port 36678 ssh2
Aug  3 14:22:18 MAKserver06 sshd[26410]: Received disconnect from 165.22.122.246 port 36678:11: Bye Bye [preauth]
Aug  3 14:22:18 MAKserver06 sshd[26410]: Disconnected from authenticating user r.r 165.22.122.246 port 36678 [preauth]
Aug  3 14:37:02 MAKserver06 sshd[30014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.122.246  user=r.r
Aug  3 14:37:04 MAKserver06 sshd[30014]: Failed password for r.r from 165.22.122.246 port 37214 ssh2
Aug  3 14:37:06 MAKserver06 sshd[30014]: Received disconnect from 165.22.122.246 port 37214:11: Bye Bye [preauth]
Aug  3 14:37:06 MAKserver06 sshd[30014]: Disconnected from authenticating user r.r 1........
------------------------------
2020-08-04 15:33:16
51.68.88.26 attack
Aug  4 07:47:50 PorscheCustomer sshd[24969]: Failed password for root from 51.68.88.26 port 57980 ssh2
Aug  4 07:50:19 PorscheCustomer sshd[25073]: Failed password for root from 51.68.88.26 port 41616 ssh2
...
2020-08-04 15:06:57
45.224.156.6 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-08-04 15:12:17
51.158.98.224 attackspam
Aug  3 19:38:55 auw2 sshd\[16793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.98.224  user=root
Aug  3 19:38:57 auw2 sshd\[16793\]: Failed password for root from 51.158.98.224 port 53622 ssh2
Aug  3 19:43:23 auw2 sshd\[17302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.98.224  user=root
Aug  3 19:43:25 auw2 sshd\[17302\]: Failed password for root from 51.158.98.224 port 38526 ssh2
Aug  3 19:47:52 auw2 sshd\[17724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.98.224  user=root
2020-08-04 15:27:20
109.125.235.250 attack
Aug  3 22:55:08 mailman postfix/smtpd[2667]: warning: unknown[109.125.235.250]: SASL PLAIN authentication failed: authentication failure
2020-08-04 15:05:53
52.117.124.44 attackbotsspam
$f2bV_matches
2020-08-04 15:03:30
92.129.147.244 attackspambots
Lines containing failures of 92.129.147.244
Aug  3 14:48:57 newdogma sshd[29553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.129.147.244  user=r.r
Aug  3 14:48:58 newdogma sshd[29553]: Failed password for r.r from 92.129.147.244 port 38328 ssh2
Aug  3 14:48:59 newdogma sshd[29553]: Received disconnect from 92.129.147.244 port 38328:11: Bye Bye [preauth]
Aug  3 14:48:59 newdogma sshd[29553]: Disconnected from authenticating user r.r 92.129.147.244 port 38328 [preauth]
Aug  3 14:54:06 newdogma sshd[29830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.129.147.244  user=r.r
Aug  3 14:54:09 newdogma sshd[29830]: Failed password for r.r from 92.129.147.244 port 51168 ssh2
Aug  3 14:54:10 newdogma sshd[29830]: Received disconnect from 92.129.147.244 port 51168:11: Bye Bye [preauth]
Aug  3 14:54:10 newdogma sshd[29830]: Disconnected from authenticating user r.r 92.129.147.244 port 51168........
------------------------------
2020-08-04 15:21:07
139.59.7.225 attack
Aug  4 02:50:48 NPSTNNYC01T sshd[20530]: Failed password for root from 139.59.7.225 port 38678 ssh2
Aug  4 02:55:20 NPSTNNYC01T sshd[20912]: Failed password for root from 139.59.7.225 port 51426 ssh2
...
2020-08-04 15:06:44

Recently Reported IPs

104.144.235.107 104.144.3.114 104.144.64.140 104.144.99.229
104.148.27.122 104.148.27.207 104.148.27.6 32.241.24.72
104.148.7.117 104.148.74.70 104.149.136.154 104.149.139.163
104.149.146.154 104.149.183.20 104.149.186.90 104.149.190.45
104.149.198.9 104.149.199.150 104.149.202.10 104.149.209.16