Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ottawa

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.157.147.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30125
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.157.147.220.		IN	A

;; AUTHORITY SECTION:
.			339	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092801 1800 900 604800 86400

;; Query time: 146 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 29 02:51:08 CST 2019
;; MSG SIZE  rcvd: 119
Host info
220.147.157.104.in-addr.arpa domain name pointer host-104-157-147-220.dyn.295.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.147.157.104.in-addr.arpa	name = host-104-157-147-220.dyn.295.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.158 attack
Unauthorized connection attempt detected from IP address 222.186.15.158 to port 22
2020-06-25 12:19:07
222.186.30.218 attack
Jun 25 06:09:54 freya sshd[30683]: Disconnected from authenticating user root 222.186.30.218 port 11735 [preauth]
...
2020-06-25 12:11:26
193.112.1.26 attackspambots
Jun 25 00:47:52 nas sshd[7062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.1.26 
Jun 25 00:47:54 nas sshd[7062]: Failed password for invalid user liang from 193.112.1.26 port 52414 ssh2
Jun 25 01:06:33 nas sshd[7735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.1.26 
...
2020-06-25 08:32:38
185.204.3.36 attackspambots
Jun 25 05:57:23 vmd48417 sshd[30525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.204.3.36
2020-06-25 12:04:42
194.95.30.24 attackbotsspam
Jun 24 16:23:07 cumulus sshd[28872]: Invalid user administrador from 194.95.30.24 port 56162
Jun 24 16:23:07 cumulus sshd[28872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.95.30.24
Jun 24 16:23:09 cumulus sshd[28872]: Failed password for invalid user administrador from 194.95.30.24 port 56162 ssh2
Jun 24 16:23:09 cumulus sshd[28872]: Received disconnect from 194.95.30.24 port 56162:11: Bye Bye [preauth]
Jun 24 16:23:09 cumulus sshd[28872]: Disconnected from 194.95.30.24 port 56162 [preauth]
Jun 24 16:39:09 cumulus sshd[30427]: Invalid user testuser from 194.95.30.24 port 41836
Jun 24 16:39:09 cumulus sshd[30427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.95.30.24
Jun 24 16:39:11 cumulus sshd[30427]: Failed password for invalid user testuser from 194.95.30.24 port 41836 ssh2
Jun 24 16:39:11 cumulus sshd[30427]: Received disconnect from 194.95.30.24 port 41836:11: Bye Bye [........
-------------------------------
2020-06-25 08:36:29
180.164.22.252 attack
Repeated brute force against a port
2020-06-25 12:27:46
165.227.140.245 attackbots
Fail2Ban - SSH Bruteforce Attempt
2020-06-25 08:33:09
45.55.9.181 attackspam
Port probing on unauthorized port 32279
2020-06-25 12:01:29
128.199.128.215 attackbots
2020-06-25T05:52:48.876319galaxy.wi.uni-potsdam.de sshd[20985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215  user=root
2020-06-25T05:52:50.624368galaxy.wi.uni-potsdam.de sshd[20985]: Failed password for root from 128.199.128.215 port 37422 ssh2
2020-06-25T05:54:58.238517galaxy.wi.uni-potsdam.de sshd[21243]: Invalid user dxc from 128.199.128.215 port 56928
2020-06-25T05:54:58.240414galaxy.wi.uni-potsdam.de sshd[21243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215
2020-06-25T05:54:58.238517galaxy.wi.uni-potsdam.de sshd[21243]: Invalid user dxc from 128.199.128.215 port 56928
2020-06-25T05:55:00.836646galaxy.wi.uni-potsdam.de sshd[21243]: Failed password for invalid user dxc from 128.199.128.215 port 56928 ssh2
2020-06-25T05:57:07.015725galaxy.wi.uni-potsdam.de sshd[21447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128
...
2020-06-25 12:19:32
111.161.74.117 attackbotsspam
Jun 25 05:55:58 jane sshd[10367]: Failed password for root from 111.161.74.117 port 48528 ssh2
Jun 25 05:57:22 jane sshd[11362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.74.117 
...
2020-06-25 12:06:57
222.186.175.154 attackspam
Jun 25 02:33:59 ns3164893 sshd[14579]: Failed password for root from 222.186.175.154 port 41456 ssh2
Jun 25 02:34:02 ns3164893 sshd[14579]: Failed password for root from 222.186.175.154 port 41456 ssh2
...
2020-06-25 08:37:23
46.38.150.153 attack
2020-06-21 23:32:37 dovecot_login authenticator failed for \(User\) \[46.38.150.153\]: 535 Incorrect authentication data \(set_id=soapstone@no-server.de\)
2020-06-21 23:32:45 dovecot_login authenticator failed for \(User\) \[46.38.150.153\]: 535 Incorrect authentication data \(set_id=soapstone@no-server.de\)
2020-06-21 23:32:46 dovecot_login authenticator failed for \(User\) \[46.38.150.153\]: 535 Incorrect authentication data \(set_id=ila@no-server.de\)
2020-06-21 23:33:02 dovecot_login authenticator failed for \(User\) \[46.38.150.153\]: 535 Incorrect authentication data \(set_id=ila@no-server.de\)
2020-06-21 23:33:09 dovecot_login authenticator failed for \(User\) \[46.38.150.153\]: 535 Incorrect authentication data \(set_id=ila@no-server.de\)
2020-06-21 23:33:13 dovecot_login authenticator failed for \(User\) \[46.38.150.153\]: 535 Incorrect authentication data \(set_id=ila@no-server.de\)
...
2020-06-25 12:20:53
62.112.11.81 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-25T03:03:57Z and 2020-06-25T03:57:24Z
2020-06-25 12:05:02
46.45.50.34 attack
Unauthorized connection attempt: SRC=46.45.50.34
...
2020-06-25 12:04:02
103.1.100.95 attackspam
Automatic report - Banned IP Access
2020-06-25 12:29:38

Recently Reported IPs

104.14.68.167 163.41.4.251 12.231.17.165 62.163.121.30
123.112.252.163 132.226.196.152 140.2.70.172 87.133.177.227
60.79.140.196 58.126.116.98 120.10.11.65 52.147.168.84
188.131.142.109 179.140.180.235 152.145.36.1 116.23.40.241
132.65.159.109 115.148.252.22 27.207.220.165 80.187.227.95