Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.144.30.170 attackbots
(From whitlow.retha@gmail.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com
2020-07-24 23:10:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.3.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.3.121.			IN	A

;; AUTHORITY SECTION:
.			289	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 00:42:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 121.3.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.3.144.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.145 attack
Sep 11 18:24:06 vpn01 sshd[32009]: Failed password for root from 218.92.0.145 port 63653 ssh2
Sep 11 18:24:15 vpn01 sshd[32009]: Failed password for root from 218.92.0.145 port 63653 ssh2
...
2020-09-12 00:59:41
216.155.93.77 attackbots
216.155.93.77 (CL/Chile/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 11 11:53:31 server5 sshd[20368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.104  user=root
Sep 11 11:53:33 server5 sshd[20368]: Failed password for root from 198.199.84.104 port 36950 ssh2
Sep 11 11:45:18 server5 sshd[16266]: Failed password for root from 88.102.244.211 port 43746 ssh2
Sep 11 11:55:09 server5 sshd[20891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.155.93.77  user=root
Sep 11 11:48:55 server5 sshd[18333]: Failed password for root from 94.159.31.10 port 3033 ssh2
Sep 11 11:48:54 server5 sshd[18333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.159.31.10  user=root

IP Addresses Blocked:

198.199.84.104 (US/United States/-)
88.102.244.211 (CZ/Czechia/-)
2020-09-12 00:24:44
195.54.167.91 attack
 TCP (SYN) 195.54.167.91:54488 -> port 25972, len 44
2020-09-12 01:00:02
118.27.39.156 attackspambots
Sep  8 01:35:49 cumulus sshd[2276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.39.156  user=r.r
Sep  8 01:35:51 cumulus sshd[2276]: Failed password for r.r from 118.27.39.156 port 51786 ssh2
Sep  8 01:35:51 cumulus sshd[2276]: Received disconnect from 118.27.39.156 port 51786:11: Bye Bye [preauth]
Sep  8 01:35:51 cumulus sshd[2276]: Disconnected from 118.27.39.156 port 51786 [preauth]
Sep  8 01:39:46 cumulus sshd[2736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.39.156  user=r.r
Sep  8 01:39:48 cumulus sshd[2736]: Failed password for r.r from 118.27.39.156 port 39230 ssh2
Sep  8 01:39:48 cumulus sshd[2736]: Received disconnect from 118.27.39.156 port 39230:11: Bye Bye [preauth]
Sep  8 01:39:48 cumulus sshd[2736]: Disconnected from 118.27.39.156 port 39230 [preauth]
Sep  8 01:40:57 cumulus sshd[2809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t........
-------------------------------
2020-09-12 00:52:58
162.247.74.206 attackspambots
2020-09-11T14:09:52.781432abusebot.cloudsearch.cf sshd[2492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rosaluxemburg.tor-exit.calyxinstitute.org  user=root
2020-09-11T14:09:54.401178abusebot.cloudsearch.cf sshd[2492]: Failed password for root from 162.247.74.206 port 40778 ssh2
2020-09-11T14:09:56.693387abusebot.cloudsearch.cf sshd[2492]: Failed password for root from 162.247.74.206 port 40778 ssh2
2020-09-11T14:09:52.781432abusebot.cloudsearch.cf sshd[2492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rosaluxemburg.tor-exit.calyxinstitute.org  user=root
2020-09-11T14:09:54.401178abusebot.cloudsearch.cf sshd[2492]: Failed password for root from 162.247.74.206 port 40778 ssh2
2020-09-11T14:09:56.693387abusebot.cloudsearch.cf sshd[2492]: Failed password for root from 162.247.74.206 port 40778 ssh2
2020-09-11T14:09:52.781432abusebot.cloudsearch.cf sshd[2492]: pam_unix(sshd:auth): authentication fail
...
2020-09-12 00:45:54
179.255.35.232 attackspambots
Invalid user tecnico from 179.255.35.232 port 32858
2020-09-12 00:46:18
194.26.25.122 attackspam
firewall-block, port(s): 6693/tcp
2020-09-12 01:00:38
94.102.53.112 attack
Fail2Ban Ban Triggered
2020-09-12 01:03:54
173.242.122.149 attack
Sep 11 10:27:44 ip106 sshd[20467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.242.122.149 
Sep 11 10:27:46 ip106 sshd[20467]: Failed password for invalid user lafleur from 173.242.122.149 port 50426 ssh2
...
2020-09-12 00:45:30
161.35.230.3 attackspambots
Port scan on 1 port(s): 4443
2020-09-12 01:04:32
218.92.0.171 attackbots
Automatic report BANNED IP
2020-09-12 00:55:38
35.187.233.244 attackbots
Fail2Ban Ban Triggered
2020-09-12 00:25:14
27.7.157.119 attackspam
Icarus honeypot on github
2020-09-12 00:26:08
192.35.168.108 attackbotsspam
6443/tcp 11211/tcp 1311/tcp...
[2020-07-12/09-10]15pkt,13pt.(tcp)
2020-09-12 00:34:55
185.247.224.45 attack
3 failed attempts at connecting to SSH.
2020-09-12 01:06:59

Recently Reported IPs

104.144.3.118 104.144.3.12 104.144.3.125 104.144.3.128
104.144.28.85 104.144.3.130 104.144.3.120 103.206.100.110
104.144.3.143 104.144.3.144 104.144.3.150 103.206.100.114
104.144.3.173 104.144.3.190 104.144.3.187 104.144.3.167
104.144.3.178 104.144.3.182 104.144.3.188 104.144.3.181