Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.34.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23408
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.34.39.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 12 00:10:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 39.34.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.34.144.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.236.71.107 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-12-25 17:59:05
175.6.5.233 attackspam
Dec 25 08:21:45 Invalid user ubuntu from 175.6.5.233 port 5779
2019-12-25 18:02:15
51.68.192.106 attackspam
Invalid user pall from 51.68.192.106 port 35726
2019-12-25 17:59:25
51.83.106.0 attack
Invalid user kakugen from 51.83.106.0 port 35244
2019-12-25 18:15:59
62.234.81.63 attackbotsspam
Dec 25 16:36:31 itv-usvr-02 sshd[28606]: Invalid user qy from 62.234.81.63 port 56544
Dec 25 16:36:31 itv-usvr-02 sshd[28606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.81.63
Dec 25 16:36:31 itv-usvr-02 sshd[28606]: Invalid user qy from 62.234.81.63 port 56544
Dec 25 16:36:33 itv-usvr-02 sshd[28606]: Failed password for invalid user qy from 62.234.81.63 port 56544 ssh2
Dec 25 16:40:49 itv-usvr-02 sshd[28756]: Invalid user allpress from 62.234.81.63 port 43291
2019-12-25 17:44:17
82.248.118.142 attack
Dec 25 09:15:21 work-partkepr sshd\[11174\]: Invalid user admin from 82.248.118.142 port 59546
Dec 25 09:15:21 work-partkepr sshd\[11174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.248.118.142
...
2019-12-25 18:15:12
128.199.95.60 attack
Dec 25 09:58:27 legacy sshd[15758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
Dec 25 09:58:29 legacy sshd[15758]: Failed password for invalid user vansambeek from 128.199.95.60 port 40026 ssh2
Dec 25 10:01:34 legacy sshd[15826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
...
2019-12-25 17:50:53
222.186.173.154 attack
Dec 25 12:05:29 www sshd\[51100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Dec 25 12:05:30 www sshd\[51100\]: Failed password for root from 222.186.173.154 port 11232 ssh2
Dec 25 12:05:47 www sshd\[51102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
...
2019-12-25 18:11:07
104.248.71.7 attack
Dec 25 11:05:16 MK-Soft-Root2 sshd[951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7 
Dec 25 11:05:19 MK-Soft-Root2 sshd[951]: Failed password for invalid user tgproxy from 104.248.71.7 port 39536 ssh2
...
2019-12-25 18:14:11
182.73.58.50 attack
Dec 24 00:45:23 netserv400 sshd[15459]: Connection from 182.73.58.50 port 55414 on 94.102.210.190 port 22
Dec 24 00:46:12 netserv400 sshd[15467]: Connection from 182.73.58.50 port 37306 on 94.102.210.190 port 22
Dec 24 00:50:34 netserv400 sshd[15563]: Connection from 182.73.58.50 port 51462 on 94.102.210.190 port 22
Dec 24 00:51:24 netserv400 sshd[15572]: Connection from 182.73.58.50 port 33300 on 94.102.210.190 port 22
Dec 24 00:58:40 netserv400 sshd[15628]: Connection from 182.73.58.50 port 44480 on 94.102.210.190 port 22
Dec 24 00:59:32 netserv400 sshd[15641]: Connection from 182.73.58.50 port 54606 on 94.102.210.190 port 22
Dec 24 01:25:21 netserv400 sshd[16053]: Connection from 182.73.58.50 port 42132 on 94.102.210.190 port 22
Dec 24 01:26:12 netserv400 sshd[16058]: Connection from 182.73.58.50 port 52258 on 94.102.210.190 port 22
Dec 24 01:33:28 netserv400 sshd[16213]: Connection from 182.73.58.50 port 39268 on 94.102.210.190 port 22
Dec 24 01:34:20 netserv400 sshd........
------------------------------
2019-12-25 17:43:46
14.231.206.169 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-12-2019 06:25:11.
2019-12-25 18:17:32
42.101.34.122 attackspambots
--- report ---
Dec 25 04:59:38 sshd: Connection from 42.101.34.122 port 54862
Dec 25 04:59:40 sshd: Invalid user gpadmin from 42.101.34.122
Dec 25 04:59:42 sshd: Failed password for invalid user gpadmin from 42.101.34.122 port 54862 ssh2
2019-12-25 18:22:56
91.87.85.210 attackspambots
Dec 25 07:25:29 * sshd[29004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.87.85.210
Dec 25 07:25:31 * sshd[29004]: Failed password for invalid user yoyo from 91.87.85.210 port 44314 ssh2
2019-12-25 17:49:17
185.153.197.139 attackspambots
12/25/2019-04:32:49.124863 185.153.197.139 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-25 18:21:37
167.172.212.160 attackspam
Dec 24 20:02:43 datentool sshd[20133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.212.160  user=r.r
Dec 24 20:02:45 datentool sshd[20133]: Failed password for r.r from 167.172.212.160 port 42014 ssh2
Dec 24 20:02:48 datentool sshd[20136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.212.160  user=r.r
Dec 24 20:02:50 datentool sshd[20136]: Failed password for r.r from 167.172.212.160 port 49994 ssh2
Dec 24 20:02:53 datentool sshd[20138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.212.160  user=r.r
Dec 24 20:02:55 datentool sshd[20138]: Failed password for r.r from 167.172.212.160 port 54162 ssh2
Dec 24 20:02:58 datentool sshd[20140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.212.160  user=r.r
Dec 24 20:03:00 datentool sshd[20140]: Failed password for r.r from 167.........
-------------------------------
2019-12-25 17:45:09

Recently Reported IPs

138.128.59.192 177.248.212.199 23.254.90.192 121.183.184.191
87.122.48.116 13.234.214.4 88.230.53.70 87.236.176.210
64.119.192.61 27.193.250.4 86.243.63.30 120.216.154.166
87.236.176.74 2.56.118.225 27.22.50.89 143.110.183.3
187.195.25.100 128.90.64.245 128.90.87.233 125.78.225.58