Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.51.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.51.118.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:02:22 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 118.51.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.51.144.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.116.41.227 attackbotsspam
Jan  3 00:06:07  sshd[29418]: Failed password for invalid user login from 190.116.41.227 port 60436 ssh2
2020-01-03 07:22:21
182.74.25.246 attackspam
Jan  2 12:34:09 server sshd\[6263\]: Invalid user admin from 182.74.25.246
Jan  2 12:34:09 server sshd\[6263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 
Jan  2 12:34:11 server sshd\[6263\]: Failed password for invalid user admin from 182.74.25.246 port 58792 ssh2
Jan  3 02:06:43 server sshd\[23885\]: Invalid user qeq from 182.74.25.246
Jan  3 02:06:43 server sshd\[23885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 
...
2020-01-03 07:35:43
112.85.42.173 attack
Jan  2 13:27:19 php1 sshd\[25752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Jan  2 13:27:21 php1 sshd\[25752\]: Failed password for root from 112.85.42.173 port 28595 ssh2
Jan  2 13:27:37 php1 sshd\[25776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Jan  2 13:27:39 php1 sshd\[25776\]: Failed password for root from 112.85.42.173 port 59966 ssh2
Jan  2 13:27:59 php1 sshd\[25803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
2020-01-03 07:29:09
78.110.50.150 attackspam
SQL injection - /pages/products.php?c=94999999.1%20union%20select%20unhex(hex(version()))%20--%20and%201%3D1
2020-01-03 07:43:27
132.232.112.217 attackspam
Jan  3 06:07:22 itv-usvr-02 sshd[29506]: Invalid user demo from 132.232.112.217 port 36920
Jan  3 06:07:22 itv-usvr-02 sshd[29506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.217
Jan  3 06:07:22 itv-usvr-02 sshd[29506]: Invalid user demo from 132.232.112.217 port 36920
Jan  3 06:07:24 itv-usvr-02 sshd[29506]: Failed password for invalid user demo from 132.232.112.217 port 36920 ssh2
2020-01-03 07:10:14
5.8.30.20 attackspambots
Jan  3 00:07:18 mail kernel: [3026179.983814] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=5.8.30.20 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=54815 DF PROTO=TCP SPT=56681 DPT=999 WINDOW=64240 RES=0x00 SYN URGP=0 
Jan  3 00:07:19 mail kernel: [3026180.984857] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=5.8.30.20 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=54816 DF PROTO=TCP SPT=56681 DPT=999 WINDOW=64240 RES=0x00 SYN URGP=0 
Jan  3 00:07:21 mail kernel: [3026182.982660] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=5.8.30.20 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=54817 DF PROTO=TCP SPT=56681 DPT=999 WINDOW=64240 RES=0x00 SYN URGP=0
2020-01-03 07:12:26
34.215.122.24 attackspambots
01/03/2020-00:22:37.739137 34.215.122.24 Protocol: 6 SURICATA TLS invalid record/traffic
2020-01-03 07:23:05
166.62.32.32 attackspambots
166.62.32.32 - - \[03/Jan/2020:00:06:44 +0100\] "POST /wp-login.php HTTP/1.0" 200 6699 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
166.62.32.32 - - \[03/Jan/2020:00:06:46 +0100\] "POST /wp-login.php HTTP/1.0" 200 6499 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
166.62.32.32 - - \[03/Jan/2020:00:06:48 +0100\] "POST /wp-login.php HTTP/1.0" 200 6515 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-03 07:33:06
185.47.187.180 attackbotsspam
Jan  3 00:06:56 localhost sshd\[4323\]: Invalid user nemias from 185.47.187.180 port 52602
Jan  3 00:06:56 localhost sshd\[4323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.187.180
Jan  3 00:06:57 localhost sshd\[4323\]: Failed password for invalid user nemias from 185.47.187.180 port 52602 ssh2
2020-01-03 07:24:49
94.191.40.39 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-01-03 07:17:40
183.62.139.167 attackspambots
SSH Brute Force, server-1 sshd[3539]: Failed password for invalid user wwwrun from 183.62.139.167 port 48528 ssh2
2020-01-03 07:48:59
192.99.12.24 attack
Jan  3 00:06:49 localhost sshd\[4307\]: Invalid user myftp from 192.99.12.24 port 55830
Jan  3 00:06:49 localhost sshd\[4307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.12.24
Jan  3 00:06:51 localhost sshd\[4307\]: Failed password for invalid user myftp from 192.99.12.24 port 55830 ssh2
2020-01-03 07:30:02
125.213.150.7 attackspam
SSH-BruteForce
2020-01-03 07:36:12
101.71.51.192 attack
Jan  3 00:04:24 sd-53420 sshd\[4307\]: User sys from 101.71.51.192 not allowed because none of user's groups are listed in AllowGroups
Jan  3 00:04:24 sd-53420 sshd\[4307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.51.192  user=sys
Jan  3 00:04:26 sd-53420 sshd\[4307\]: Failed password for invalid user sys from 101.71.51.192 port 59575 ssh2
Jan  3 00:07:09 sd-53420 sshd\[5150\]: Invalid user gang123 from 101.71.51.192
Jan  3 00:07:09 sd-53420 sshd\[5150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.51.192
...
2020-01-03 07:19:36
45.143.223.15 attackbots
Brute force attempt
2020-01-03 07:44:32

Recently Reported IPs

104.144.51.120 104.144.51.129 104.144.51.127 104.144.51.146
104.144.51.142 104.144.51.138 104.144.51.148 104.144.51.160
104.144.51.163 104.144.51.168 104.144.51.164 104.144.51.178
104.144.51.171 104.144.51.18 104.145.234.6 104.145.10.202
104.149.177.196 104.149.177.253 104.149.179.76 104.149.179.77