Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.255.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26130
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.255.59.			IN	A

;; AUTHORITY SECTION:
.			270	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040600 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 06 23:26:10 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 59.255.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 59.255.144.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.81.111 attack
2020-04-04 UTC: (3x) - guest(2x),root
2020-04-05 17:55:23
201.140.123.130 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-05 17:30:29
122.144.134.27 attackspam
Fail2Ban Ban Triggered
2020-04-05 17:50:41
43.226.41.171 attackspam
2020-04-05T05:37:14.030989  sshd[22799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.41.171  user=root
2020-04-05T05:37:16.320637  sshd[22799]: Failed password for root from 43.226.41.171 port 43144 ssh2
2020-04-05T05:51:21.225229  sshd[23056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.41.171  user=root
2020-04-05T05:51:22.933344  sshd[23056]: Failed password for root from 43.226.41.171 port 58540 ssh2
...
2020-04-05 17:51:16
158.69.38.240 attackspam
Unauthorized connection attempt, very violent continuous attack! IP address disabled!
2020-04-05 17:43:23
188.128.43.28 attackbotsspam
Invalid user test from 188.128.43.28 port 48422
2020-04-05 17:53:18
106.13.38.246 attackspambots
Apr  5 06:22:14 pve sshd[11053]: Failed password for root from 106.13.38.246 port 49006 ssh2
Apr  5 06:25:39 pve sshd[11686]: Failed password for root from 106.13.38.246 port 38858 ssh2
2020-04-05 17:31:17
66.70.178.55 attack
Apr  4 22:31:26 web9 sshd\[9450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.178.55  user=root
Apr  4 22:31:28 web9 sshd\[9450\]: Failed password for root from 66.70.178.55 port 40780 ssh2
Apr  4 22:36:03 web9 sshd\[10069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.178.55  user=root
Apr  4 22:36:05 web9 sshd\[10069\]: Failed password for root from 66.70.178.55 port 44188 ssh2
Apr  4 22:40:36 web9 sshd\[10673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.178.55  user=root
2020-04-05 17:46:44
210.227.113.18 attack
$f2bV_matches
2020-04-05 17:33:16
207.180.243.116 attackspam
Fail2Ban - SSH Bruteforce Attempt
2020-04-05 17:37:45
151.80.131.13 attack
Apr  5 10:27:53 nextcloud sshd\[23148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.131.13  user=root
Apr  5 10:27:56 nextcloud sshd\[23148\]: Failed password for root from 151.80.131.13 port 46748 ssh2
Apr  5 10:36:19 nextcloud sshd\[2363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.131.13  user=root
2020-04-05 17:20:09
106.13.226.170 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-04-05 17:38:23
180.169.129.180 attackspambots
2020-04-05T09:18:49.425880rocketchat.forhosting.nl sshd[22542]: Failed password for root from 180.169.129.180 port 59198 ssh2
2020-04-05T09:21:22.762766rocketchat.forhosting.nl sshd[22605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.169.129.180  user=root
2020-04-05T09:21:25.036018rocketchat.forhosting.nl sshd[22605]: Failed password for root from 180.169.129.180 port 37932 ssh2
...
2020-04-05 18:01:53
45.136.108.85 attackbotsspam
Apr  5 11:34:14 karger sshd[27230]: Connection from 45.136.108.85 port 20529 on 188.68.60.164 port 22
Apr  5 11:34:14 karger sshd[27230]: Invalid user 0 from 45.136.108.85 port 20529
Apr  5 11:34:16 karger sshd[27232]: Connection from 45.136.108.85 port 2658 on 188.68.60.164 port 22
Apr  5 11:34:20 karger sshd[27232]: Invalid user 22 from 45.136.108.85 port 2658
Apr  5 11:34:23 karger sshd[27234]: Connection from 45.136.108.85 port 51925 on 188.68.60.164 port 22
Apr  5 11:34:25 karger sshd[27234]: Invalid user 101 from 45.136.108.85 port 51925
Apr  5 11:34:26 karger sshd[27236]: Connection from 45.136.108.85 port 35992 on 188.68.60.164 port 22
Apr  5 11:34:28 karger sshd[27236]: Invalid user 123 from 45.136.108.85 port 35992
Apr  5 11:34:29 karger sshd[27242]: Connection from 45.136.108.85 port 1218 on 188.68.60.164 port 22
Apr  5 11:34:31 karger sshd[27242]: Invalid user 1111 from 45.136.108.85 port 1218
...
2020-04-05 17:48:29
125.91.127.21 attack
$f2bV_matches
2020-04-05 17:22:12

Recently Reported IPs

104.144.255.37 229.19.219.143 104.144.255.6 104.144.255.67
96.227.202.231 104.144.255.77 104.144.255.84 244.70.125.137
104.144.255.89 104.144.28.27 141.55.116.38 104.144.28.37
51.184.51.34 104.144.28.39 104.144.28.76 104.144.28.96
104.144.3.100 104.144.3.251 104.144.37.101 104.144.37.140