Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.194.83.8 attackspam
Invalid user pay from 104.194.83.8 port 40444
2020-06-18 15:56:40
104.194.83.8 attackspambots
Invalid user uhq from 104.194.83.8 port 32868
2020-05-23 07:39:39
104.194.83.8 attack
Apr 26 15:02:29 server sshd[16526]: Failed password for root from 104.194.83.8 port 43134 ssh2
Apr 26 15:11:16 server sshd[19198]: Failed password for invalid user sky from 104.194.83.8 port 48376 ssh2
Apr 26 15:20:04 server sshd[21914]: Failed password for root from 104.194.83.8 port 53566 ssh2
2020-04-27 01:13:34
104.194.83.8 attackbotsspam
DATE:2020-04-24 15:29:38, IP:104.194.83.8, PORT:ssh SSH brute force auth (docker-dc)
2020-04-25 01:09:32
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       104.194.64.0 - 104.194.95.255
CIDR:           104.194.64.0/19
NetName:        IT7NET
NetHandle:      NET-104-194-64-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   IT7 Networks Inc (IN-27)
RegDate:        2014-09-02
Updated:        2024-10-15
Comment:        Geofeed https://deploy.sioru.net/geofeed/feed.csv
Comment:        Abuse desk: abuse@sioru.com or https://www.it7.net/contact/
Ref:            https://rdap.arin.net/registry/ip/104.194.64.0


OrgName:        IT7 Networks Inc
OrgId:          IN-27
Address:        4974 Kingsway Ave
Address:        Suite 668
City:           Burnaby
StateProv:      BC
PostalCode:     V5H 4M9
Country:        CA
RegDate:        2013-01-11
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/IN-27


OrgTechHandle: TECHN1201-ARIN
OrgTechName:   Technical Contact
OrgTechPhone:  +1-408-260-5757 
OrgTechEmail:  arin-tech@sioru.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECHN1201-ARIN

OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-408-260-5757 
OrgAbuseEmail:  abuse@sioru.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3623-ARIN

OrgNOCHandle: NOC12969-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-408-260-5757 
OrgNOCEmail:  arin-noc@sioru.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC12969-ARIN

# end


# start

NetRange:       104.194.80.0 - 104.194.83.255
CIDR:           104.194.80.0/22
NetName:        IT7NET-104-194-80-0-22
NetHandle:      NET-104-194-80-0-1
Parent:         IT7NET (NET-104-194-64-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       IT7 Networks Inc (C05288812)
RegDate:        2014-09-06
Updated:        2014-09-06
Comment:        Please send abuse reports to abuse@sioru.com for automatic processing
Ref:            https://rdap.arin.net/registry/ip/104.194.80.0


CustName:       IT7 Networks Inc
Address:        530 W 6th Street
City:           Los Angeles
StateProv:      CA
PostalCode:     90014
Country:        US
RegDate:        2014-09-06
Updated:        2014-09-06
Ref:            https://rdap.arin.net/registry/entity/C05288812

OrgTechHandle: TECHN1201-ARIN
OrgTechName:   Technical Contact
OrgTechPhone:  +1-408-260-5757 
OrgTechEmail:  arin-tech@sioru.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECHN1201-ARIN

OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-408-260-5757 
OrgAbuseEmail:  abuse@sioru.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3623-ARIN

OrgNOCHandle: NOC12969-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-408-260-5757 
OrgNOCEmail:  arin-noc@sioru.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC12969-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.194.83.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.194.83.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040100 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 22:32:38 CST 2026
;; MSG SIZE  rcvd: 107
Host info
143.83.194.104.in-addr.arpa domain name pointer 104.194.83.143.16clouds.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.83.194.104.in-addr.arpa	name = 104.194.83.143.16clouds.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.190.55.213 attackbotsspam
Invalid user ntp from 203.190.55.213 port 42205
2020-04-30 03:11:12
106.13.44.100 attackspam
$f2bV_matches
2020-04-30 03:30:42
178.128.58.117 attackbotsspam
Invalid user dossie from 178.128.58.117 port 52848
2020-04-30 03:15:57
186.33.216.36 attackbotsspam
Invalid user ml from 186.33.216.36 port 53283
2020-04-30 03:14:09
93.145.26.139 attackbots
Invalid user mailtest from 93.145.26.139 port 29902
2020-04-30 02:59:52
118.89.231.109 attack
Invalid user naoki from 118.89.231.109 port 48566
2020-04-30 03:28:42
152.136.58.127 attackbotsspam
Invalid user centos from 152.136.58.127 port 58622
2020-04-30 03:20:37
177.128.104.207 attackbots
Invalid user ridzwan from 177.128.104.207 port 57594
2020-04-30 03:16:58
139.199.32.57 attack
SSH bruteforce
2020-04-30 03:23:06
69.229.6.44 attackspambots
Invalid user fa from 69.229.6.44 port 58012
2020-04-30 03:02:58
156.236.71.123 attackspambots
Failed password for root from 156.236.71.123 port 38378 ssh2
2020-04-30 03:20:13
93.146.237.163 attack
Apr 29 15:43:31 ns382633 sshd\[7989\]: Invalid user netadmin from 93.146.237.163 port 49906
Apr 29 15:43:31 ns382633 sshd\[7989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.146.237.163
Apr 29 15:43:33 ns382633 sshd\[7989\]: Failed password for invalid user netadmin from 93.146.237.163 port 49906 ssh2
Apr 29 15:50:04 ns382633 sshd\[9244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.146.237.163  user=root
Apr 29 15:50:06 ns382633 sshd\[9244\]: Failed password for root from 93.146.237.163 port 34806 ssh2
2020-04-30 02:59:31
106.12.200.160 attackspambots
(sshd) Failed SSH login from 106.12.200.160 (CN/China/-): 5 in the last 3600 secs
2020-04-30 03:31:42
209.141.44.67 attack
Apr 29 21:00:37 eventyay sshd[15452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.44.67
Apr 29 21:00:39 eventyay sshd[15452]: Failed password for invalid user awd from 209.141.44.67 port 36012 ssh2
Apr 29 21:04:19 eventyay sshd[15606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.44.67
...
2020-04-30 03:10:33
109.244.101.128 attackbotsspam
Failed password for root from 109.244.101.128 port 38682 ssh2
2020-04-30 03:29:54

Recently Reported IPs

80.150.64.25 5.237.111.144 2606:4700:10::6814:8589 2606:4700:10::6816:4039
2606:4700:10::ac43:1244 109.167.82.101 2606:4700:10::6816:1442 2606:4700:10::6814:9355
2606:4700:10::6814:9410 2606:4700:10::6814:9993 249.227.250.167 210.196.174.22
197.16.98.216 190.5.48.110 66.132.172.221 18.202.22.59
43.205.213.93 162.9.179.11 147.53.78.1 20.104.69.172