Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phoenix

Region: Arizona

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.161.44.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.161.44.118.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 15:43:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
118.44.161.104.in-addr.arpa domain name pointer high-link.itsycable.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.44.161.104.in-addr.arpa	name = high-link.itsycable.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.239.38.159 attack
Telnetd brute force attack detected by fail2ban
2019-06-29 06:27:08
143.0.140.253 attack
failed_logins
2019-06-29 06:05:39
164.52.24.165 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-06-29 06:31:15
113.118.33.252 attackspambots
Jun 28 15:36:08 vps647732 sshd[6677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.118.33.252
Jun 28 15:36:10 vps647732 sshd[6677]: Failed password for invalid user csgoserver from 113.118.33.252 port 38971 ssh2
...
2019-06-29 05:57:45
93.88.78.115 attack
Automated report - ssh fail2ban:
Jun 28 17:51:44 wrong password, user=admin, port=59740, ssh2
Jun 28 18:22:25 authentication failure 
Jun 28 18:22:26 wrong password, user=crespo.wang, port=56232, ssh2
2019-06-29 05:54:47
220.73.31.134 attackbots
Jun 28 16:27:19 master sshd[15276]: Failed password for invalid user admin from 220.73.31.134 port 33093 ssh2
Jun 28 16:27:23 master sshd[15276]: Failed password for invalid user admin from 220.73.31.134 port 33093 ssh2
Jun 28 16:27:27 master sshd[15276]: Failed password for invalid user admin from 220.73.31.134 port 33093 ssh2
2019-06-29 06:35:38
51.255.46.83 attack
Jun 28 21:51:16 ns37 sshd[32505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.46.83
Jun 28 21:51:16 ns37 sshd[32505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.46.83
2019-06-29 06:24:16
213.169.64.12 attackspambots
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"traveltocity@zohomail.eu","user_login":"traveltocityyy","wp-submit":"Register"}
2019-06-29 06:13:14
97.81.153.39 attack
TCP port 9000 (Trojan) attempt blocked by firewall. [2019-06-28 15:33:47]
2019-06-29 06:22:19
36.112.130.77 attackbotsspam
Jun 29 00:07:07 localhost sshd\[18095\]: Invalid user song from 36.112.130.77
Jun 29 00:07:07 localhost sshd\[18095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.130.77
Jun 29 00:07:09 localhost sshd\[18095\]: Failed password for invalid user song from 36.112.130.77 port 54336 ssh2
Jun 29 00:09:36 localhost sshd\[18161\]: Invalid user ali from 36.112.130.77
Jun 29 00:09:36 localhost sshd\[18161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.130.77
...
2019-06-29 06:26:44
218.89.187.52 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-29 06:30:04
191.240.89.0 attack
Brute force attack to crack SMTP password (port 25 / 587)
2019-06-29 06:14:38
191.53.221.50 attackbotsspam
failed_logins
2019-06-29 06:25:07
2604:a880:0:1010::1b1:b001 attackbotsspam
Tried to exploit WP configurations.
2019-06-29 06:22:33
41.79.223.218 attack
SSH invalid-user multiple login try
2019-06-29 06:15:11

Recently Reported IPs

104.161.44.120 104.161.44.119 104.168.22.118 104.168.169.71
104.168.66.187 104.17.110.41 104.17.109.41 104.17.102.232
104.17.224.107 104.18.106.52 104.18.1.162 104.18.137.89
104.18.203.80 104.18.202.153 104.18.202.80 104.18.235.203
104.18.206.39 104.18.4.79 104.18.33.55 104.18.29.94