Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.161.64.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.161.64.214.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 17:04:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
214.64.161.104.in-addr.arpa domain name pointer we.love.servers.at.ioflood.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.64.161.104.in-addr.arpa	name = we.love.servers.at.ioflood.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
137.116.45.104 attackbotsspam
*Port Scan* detected from 137.116.45.104 (US/United States/Virginia/Ashburn/-). 4 hits in the last 190 seconds
2020-08-18 19:56:27
161.117.7.137 attackspam
Aug 18 05:47:05 fhem-rasp sshd[29918]: Failed password for root from 161.117.7.137 port 53280 ssh2
Aug 18 05:47:07 fhem-rasp sshd[29918]: Disconnected from authenticating user root 161.117.7.137 port 53280 [preauth]
...
2020-08-18 20:07:40
104.248.158.95 attackspam
104.248.158.95 - - [18/Aug/2020:07:01:38 +0100] "POST /wp-login.php HTTP/1.1" 200 2136 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.158.95 - - [18/Aug/2020:07:01:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2156 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.158.95 - - [18/Aug/2020:07:01:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-18 19:55:52
178.32.163.202 attack
2020-08-18T10:43:26.108449billing sshd[17443]: Invalid user lixuan from 178.32.163.202 port 51318
2020-08-18T10:43:28.010111billing sshd[17443]: Failed password for invalid user lixuan from 178.32.163.202 port 51318 ssh2
2020-08-18T10:46:51.422432billing sshd[25155]: Invalid user liuyang from 178.32.163.202 port 60142
...
2020-08-18 20:20:52
113.167.42.94 attackspam
1597722425 - 08/18/2020 05:47:05 Host: 113.167.42.94/113.167.42.94 Port: 445 TCP Blocked
...
2020-08-18 20:10:04
186.67.115.166 attack
trying to access non-authorized port
2020-08-18 20:01:01
42.200.118.11 attack
20/8/17@23:47:01: FAIL: Alarm-Network address from=42.200.118.11
...
2020-08-18 20:14:17
116.85.26.21 attack
Aug 18 12:59:13 rancher-0 sshd[1141434]: Invalid user test11 from 116.85.26.21 port 36644
...
2020-08-18 19:48:01
97.116.147.67 attackspam
SSH/22 MH Probe, BF, Hack -
2020-08-18 20:10:26
61.164.246.45 attackbotsspam
Aug 18 13:44:37 itv-usvr-01 sshd[16360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.246.45  user=mysql
Aug 18 13:44:39 itv-usvr-01 sshd[16360]: Failed password for mysql from 61.164.246.45 port 51168 ssh2
Aug 18 13:47:28 itv-usvr-01 sshd[16491]: Invalid user rohit from 61.164.246.45
Aug 18 13:47:28 itv-usvr-01 sshd[16491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.246.45
Aug 18 13:47:28 itv-usvr-01 sshd[16491]: Invalid user rohit from 61.164.246.45
Aug 18 13:47:29 itv-usvr-01 sshd[16491]: Failed password for invalid user rohit from 61.164.246.45 port 49782 ssh2
2020-08-18 20:03:14
223.30.156.108 attackspam
20/8/17@23:46:45: FAIL: Alarm-Network address from=223.30.156.108
...
2020-08-18 20:23:46
84.144.87.5 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-18 20:13:47
122.51.224.6 attack
20 attempts against mh-misbehave-ban on air
2020-08-18 20:15:36
183.250.129.50 attackbotsspam
Port Scan
...
2020-08-18 19:46:08
177.44.208.107 attackspambots
Aug 18 11:28:22 onepixel sshd[3969100]: Invalid user larry from 177.44.208.107 port 42578
Aug 18 11:28:22 onepixel sshd[3969100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.44.208.107 
Aug 18 11:28:22 onepixel sshd[3969100]: Invalid user larry from 177.44.208.107 port 42578
Aug 18 11:28:24 onepixel sshd[3969100]: Failed password for invalid user larry from 177.44.208.107 port 42578 ssh2
Aug 18 11:32:18 onepixel sshd[3971301]: Invalid user guest from 177.44.208.107 port 56800
2020-08-18 19:49:18

Recently Reported IPs

104.161.33.106 104.161.80.114 104.161.80.221 14.52.74.2
104.161.92.2 104.161.92.252 104.164.229.54 104.164.234.48
143.33.51.32 104.164.253.109 104.164.59.62 104.164.98.98
104.165.110.88 104.165.119.211 104.165.196.120 104.165.36.233
104.165.36.242 104.165.42.102 104.165.71.163 104.166.188.189