Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stoney Creek

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.34.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.144.34.146.			IN	A

;; AUTHORITY SECTION:
.			447	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011100 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 04:01:13 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 146.34.144.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 146.34.144.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.230.227.17 attackbots
Automatic report - Banned IP Access
2019-10-11 18:21:42
222.233.53.132 attackbotsspam
Invalid user 123QWEASD from 222.233.53.132 port 39094
2019-10-11 18:06:00
103.208.220.122 attackbotsspam
Oct 10 23:47:40 xentho sshd[10309]: Invalid user admin from 103.208.220.122 port 60338
Oct 10 23:47:40 xentho sshd[10309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.208.220.122
Oct 10 23:47:40 xentho sshd[10309]: Invalid user admin from 103.208.220.122 port 60338
Oct 10 23:47:41 xentho sshd[10309]: Failed password for invalid user admin from 103.208.220.122 port 60338 ssh2
Oct 10 23:47:47 xentho sshd[10311]: Invalid user admin1 from 103.208.220.122 port 33214
Oct 10 23:47:47 xentho sshd[10311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.208.220.122
Oct 10 23:47:47 xentho sshd[10311]: Invalid user admin1 from 103.208.220.122 port 33214
Oct 10 23:47:49 xentho sshd[10311]: Failed password for invalid user admin1 from 103.208.220.122 port 33214 ssh2
Oct 10 23:47:55 xentho sshd[10313]: Invalid user admin2 from 103.208.220.122 port 34510
Oct 10 23:47:55 xentho sshd[10313]: pam_unix(sshd:auth): 
...
2019-10-11 18:42:06
139.59.13.223 attackspam
Oct 11 03:37:45 localhost sshd\[11151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.223  user=root
Oct 11 03:37:47 localhost sshd\[11151\]: Failed password for root from 139.59.13.223 port 57812 ssh2
Oct 11 03:49:27 localhost sshd\[11359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.223  user=root
...
2019-10-11 17:59:58
50.28.105.21 attackspambots
abcdata-sys.de:80 50.28.105.21 - - \[11/Oct/2019:05:49:06 +0200\] "POST /xmlrpc.php HTTP/1.1" 301 441 "-" "Windows Live Writter"
www.goldgier.de 50.28.105.21 \[11/Oct/2019:05:49:07 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4484 "-" "Windows Live Writter"
2019-10-11 18:11:27
185.187.74.235 attackbots
Oct 10 20:55:22 hanapaa sshd\[7707\]: Invalid user 123Crocodile from 185.187.74.235
Oct 10 20:55:22 hanapaa sshd\[7707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.187.74.235
Oct 10 20:55:24 hanapaa sshd\[7707\]: Failed password for invalid user 123Crocodile from 185.187.74.235 port 42074 ssh2
Oct 10 20:59:43 hanapaa sshd\[8055\]: Invalid user Weltfirma123 from 185.187.74.235
Oct 10 20:59:43 hanapaa sshd\[8055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.187.74.235
2019-10-11 18:43:35
201.48.65.147 attack
fail2ban
2019-10-11 18:09:44
193.31.24.113 attack
10/11/2019-12:26:24.088239 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-11 18:40:06
59.95.60.69 attackspambots
Automatic report - Port Scan Attack
2019-10-11 18:16:15
192.227.252.23 attackbots
2019-10-11T09:52:46.223919shield sshd\[6993\]: Invalid user United123 from 192.227.252.23 port 43570
2019-10-11T09:52:46.229581shield sshd\[6993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.23
2019-10-11T09:52:48.484485shield sshd\[6993\]: Failed password for invalid user United123 from 192.227.252.23 port 43570 ssh2
2019-10-11T09:59:34.586424shield sshd\[7552\]: Invalid user Parola@1234 from 192.227.252.23 port 45582
2019-10-11T09:59:34.592341shield sshd\[7552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.23
2019-10-11 18:11:43
167.114.0.23 attack
Oct 11 10:59:33 ncomp sshd[16852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.0.23  user=root
Oct 11 10:59:35 ncomp sshd[16852]: Failed password for root from 167.114.0.23 port 36832 ssh2
Oct 11 11:03:56 ncomp sshd[17437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.0.23  user=root
Oct 11 11:03:58 ncomp sshd[17437]: Failed password for root from 167.114.0.23 port 53848 ssh2
2019-10-11 18:35:01
91.121.136.44 attackspam
Oct 11 03:48:28 work-partkepr sshd\[26652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44  user=root
Oct 11 03:48:30 work-partkepr sshd\[26652\]: Failed password for root from 91.121.136.44 port 47786 ssh2
...
2019-10-11 18:32:20
46.101.104.225 attack
Automatic report - XMLRPC Attack
2019-10-11 18:21:26
46.101.17.215 attackspambots
Oct 11 11:50:30 MainVPS sshd[18344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215  user=root
Oct 11 11:50:33 MainVPS sshd[18344]: Failed password for root from 46.101.17.215 port 56800 ssh2
Oct 11 11:54:22 MainVPS sshd[18609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215  user=root
Oct 11 11:54:24 MainVPS sshd[18609]: Failed password for root from 46.101.17.215 port 40188 ssh2
Oct 11 11:58:12 MainVPS sshd[18881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215  user=root
Oct 11 11:58:15 MainVPS sshd[18881]: Failed password for root from 46.101.17.215 port 51810 ssh2
...
2019-10-11 17:59:05
51.158.147.12 attackbots
$f2bV_matches
2019-10-11 18:16:28

Recently Reported IPs

181.241.167.225 35.96.173.216 100.178.32.192 132.228.97.111
81.18.225.19 69.92.184.148 52.218.31.77 160.249.211.167
80.0.63.37 213.245.197.163 36.230.253.85 179.182.116.253
194.90.79.231 46.86.93.87 35.230.72.13 120.236.117.205
128.90.27.246 24.180.212.254 65.11.120.201 37.146.203.222