Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.208.64.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.208.64.142.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 18:41:49 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 142.64.208.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.64.208.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.50.111.141 attackspambots
2020-08-16T13:16:13.197301morrigan.ad5gb.com sshd[533645]: Invalid user ubuntu from 189.50.111.141 port 47908
2020-08-16T13:16:15.396383morrigan.ad5gb.com sshd[533645]: Failed password for invalid user ubuntu from 189.50.111.141 port 47908 ssh2
2020-08-17 02:20:18
134.175.230.209 attack
2020-08-16T19:15:37.975855hostname sshd[30962]: Invalid user administrador from 134.175.230.209 port 38988
2020-08-16T19:15:40.933685hostname sshd[30962]: Failed password for invalid user administrador from 134.175.230.209 port 38988 ssh2
2020-08-16T19:20:18.406332hostname sshd[31585]: Invalid user cloud from 134.175.230.209 port 39102
...
2020-08-17 02:29:09
137.74.213.142 attackbots
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-17 02:04:50
180.76.141.221 attackspambots
SSH Brute-Forcing (server2)
2020-08-17 01:59:55
103.45.190.181 attack
Lines containing failures of 103.45.190.181
Aug 16 14:14:35 shared04 sshd[31436]: Invalid user tomcat9 from 103.45.190.181 port 57388
Aug 16 14:14:35 shared04 sshd[31436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.190.181
Aug 16 14:14:37 shared04 sshd[31436]: Failed password for invalid user tomcat9 from 103.45.190.181 port 57388 ssh2
Aug 16 14:14:37 shared04 sshd[31436]: Received disconnect from 103.45.190.181 port 57388:11: Bye Bye [preauth]
Aug 16 14:14:37 shared04 sshd[31436]: Disconnected from invalid user tomcat9 103.45.190.181 port 57388 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.45.190.181
2020-08-17 02:22:12
36.67.32.45 attack
2020-08-16T13:34:13.610617devel sshd[20157]: Failed password for invalid user bot from 36.67.32.45 port 47820 ssh2
2020-08-16T13:40:28.233797devel sshd[20560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.32.45  user=root
2020-08-16T13:40:30.291653devel sshd[20560]: Failed password for root from 36.67.32.45 port 34842 ssh2
2020-08-17 02:11:54
49.234.82.73 attackbotsspam
Aug 16 14:21:42 [host] sshd[7179]: Invalid user tu
Aug 16 14:21:42 [host] sshd[7179]: pam_unix(sshd:a
Aug 16 14:21:45 [host] sshd[7179]: Failed password
2020-08-17 02:07:35
51.77.215.0 attackspambots
Aug 16 17:45:51 game-panel sshd[25565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.215.0
Aug 16 17:45:52 game-panel sshd[25565]: Failed password for invalid user roberta from 51.77.215.0 port 32966 ssh2
Aug 16 17:52:58 game-panel sshd[25825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.215.0
2020-08-17 02:09:24
165.22.215.192 attackbots
$f2bV_matches
2020-08-17 02:31:11
219.240.99.110 attack
Aug 16 18:13:16 *** sshd[28547]: Invalid user oracle from 219.240.99.110
2020-08-17 02:13:26
68.183.111.135 attackbotsspam
68.183.111.135 - - [16/Aug/2020:18:15:31 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.111.135 - - [16/Aug/2020:18:15:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1970 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.111.135 - - [16/Aug/2020:18:15:34 +0100] "POST /wp-login.php HTTP/1.1" 200 1973 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-17 02:08:39
61.177.172.41 attack
Aug 16 20:18:47 abendstille sshd\[13768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41  user=root
Aug 16 20:18:48 abendstille sshd\[13768\]: Failed password for root from 61.177.172.41 port 65252 ssh2
Aug 16 20:18:48 abendstille sshd\[13770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41  user=root
Aug 16 20:18:50 abendstille sshd\[13770\]: Failed password for root from 61.177.172.41 port 43006 ssh2
Aug 16 20:18:51 abendstille sshd\[13768\]: Failed password for root from 61.177.172.41 port 65252 ssh2
...
2020-08-17 02:22:36
129.211.74.252 attackspambots
Aug 16 15:10:37 ws22vmsma01 sshd[193519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.74.252
Aug 16 15:10:39 ws22vmsma01 sshd[193519]: Failed password for invalid user test from 129.211.74.252 port 53966 ssh2
...
2020-08-17 02:20:46
51.89.149.241 attackspam
Aug 16 16:41:09 abendstille sshd\[30010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.241  user=root
Aug 16 16:41:12 abendstille sshd\[30010\]: Failed password for root from 51.89.149.241 port 52126 ssh2
Aug 16 16:45:42 abendstille sshd\[2879\]: Invalid user teste from 51.89.149.241
Aug 16 16:45:42 abendstille sshd\[2879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.241
Aug 16 16:45:44 abendstille sshd\[2879\]: Failed password for invalid user teste from 51.89.149.241 port 34390 ssh2
...
2020-08-17 02:18:31
103.92.209.3 attackbots
[SunAug1614:21:47.2075112020][:error][pid11934:tid47751296157440][client103.92.209.3:49788][client103.92.209.3]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"426"][id"330131"][rev"3"][msg"Atomicorp.comWAFRules:MaliciousBotBlocked\(FakeMozillaUserAgentStringDetected\)"][severity"CRITICAL"][hostname"bluwater.ch"][uri"/wp-admin/setup-config.php"][unique_id"Xzkk24RGbpAEyRI-9MlWxAAAAM4"]\,referer:bluwater.ch[SunAug1614:21:50.3490522020][:error][pid12083:tid47751275144960][client103.92.209.3:50166][client103.92.209.3]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"426"][id"330131"][rev"3"][msg"Atomicorp.comWAFRules
2020-08-17 02:02:28

Recently Reported IPs

104.208.33.186 104.208.74.144 104.208.80.219 104.208.80.64
104.208.85.149 178.180.170.100 136.181.242.91 104.208.85.219
104.208.87.216 104.208.88.29 23.228.215.101 104.208.92.252
104.208.92.32 104.208.94.116 104.208.97.86 200.114.34.136
104.208.98.101 104.209.161.64 104.209.183.208 104.209.194.14