Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: Global Frag Networks

Hostname: unknown

Organization: Global Frag Networks

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
Invalid user testuser1 from 104.223.142.180 port 38147
2019-08-15 12:05:01
attackspam
Aug 12 21:28:34 xxxxxxx0 sshd[4140]: Invalid user music from 104.223.142.180 port 47357
Aug 12 21:28:34 xxxxxxx0 sshd[4140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.223.142.180
Aug 12 21:28:36 xxxxxxx0 sshd[4140]: Failed password for invalid user music from 104.223.142.180 port 47357 ssh2
Aug 12 21:45:00 xxxxxxx0 sshd[6669]: Invalid user craig2 from 104.223.142.180 port 53852
Aug 12 21:45:00 xxxxxxx0 sshd[6669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.223.142.180

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.223.142.180
2019-08-15 04:42:07
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.223.142.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25649
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.223.142.180.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081401 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 15 04:42:01 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 180.142.223.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 180.142.223.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
163.44.150.247 attackbotsspam
2020-04-26T14:00:31.534170v22018076590370373 sshd[490]: Invalid user mirna from 163.44.150.247 port 40973
2020-04-26T14:00:31.540851v22018076590370373 sshd[490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247
2020-04-26T14:00:31.534170v22018076590370373 sshd[490]: Invalid user mirna from 163.44.150.247 port 40973
2020-04-26T14:00:33.675910v22018076590370373 sshd[490]: Failed password for invalid user mirna from 163.44.150.247 port 40973 ssh2
2020-04-26T14:04:28.855281v22018076590370373 sshd[28416]: Invalid user postgres from 163.44.150.247 port 43853
...
2020-04-27 01:01:10
178.32.218.192 attackbots
Apr 26 14:08:57 icinga sshd[9272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.218.192 
Apr 26 14:08:58 icinga sshd[9272]: Failed password for invalid user lv from 178.32.218.192 port 60059 ssh2
Apr 26 14:20:30 icinga sshd[28990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.218.192 
...
2020-04-27 00:39:55
143.248.95.235 attack
(sshd) Failed SSH login from 143.248.95.235 (KR/South Korea/-): 5 in the last 3600 secs
2020-04-27 00:33:49
213.65.119.251 attackbots
scan z
2020-04-27 01:04:36
95.85.9.94 attackbotsspam
Apr 26 15:03:12 v22018086721571380 sshd[1471]: Failed password for invalid user elasticsearch from 95.85.9.94 port 60331 ssh2
2020-04-27 00:47:54
106.12.89.154 attackspam
Apr 26 14:52:57 * sshd[5768]: Failed password for root from 106.12.89.154 port 53908 ssh2
Apr 26 14:57:11 * sshd[6447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.154
2020-04-27 00:39:01
14.187.99.94 attackspambots
Unauthorized connection attempt from IP address 14.187.99.94 on Port 445(SMB)
2020-04-27 00:42:52
85.95.188.248 attackspam
Unauthorized connection attempt from IP address 85.95.188.248 on Port 445(SMB)
2020-04-27 00:51:20
45.161.164.228 attackbotsspam
Unauthorized connection attempt from IP address 45.161.164.228 on Port 445(SMB)
2020-04-27 01:09:42
109.184.85.12 attack
Unauthorized connection attempt from IP address 109.184.85.12 on Port 445(SMB)
2020-04-27 00:37:54
183.89.243.58 attackspam
Distributed brute force attack
2020-04-27 00:57:32
68.183.178.162 attack
2020-04-26T15:55:51.665392abusebot-8.cloudsearch.cf sshd[11416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162  user=root
2020-04-26T15:55:53.567056abusebot-8.cloudsearch.cf sshd[11416]: Failed password for root from 68.183.178.162 port 36300 ssh2
2020-04-26T16:00:20.359319abusebot-8.cloudsearch.cf sshd[11684]: Invalid user jetty from 68.183.178.162 port 48060
2020-04-26T16:00:20.369893abusebot-8.cloudsearch.cf sshd[11684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
2020-04-26T16:00:20.359319abusebot-8.cloudsearch.cf sshd[11684]: Invalid user jetty from 68.183.178.162 port 48060
2020-04-26T16:00:22.532612abusebot-8.cloudsearch.cf sshd[11684]: Failed password for invalid user jetty from 68.183.178.162 port 48060 ssh2
2020-04-26T16:04:42.768610abusebot-8.cloudsearch.cf sshd[11927]: Invalid user me from 68.183.178.162 port 59818
...
2020-04-27 00:46:06
115.159.237.89 attack
Apr 26 14:22:09 plex sshd[26467]: Invalid user dwi from 115.159.237.89 port 44522
Apr 26 14:22:12 plex sshd[26467]: Failed password for invalid user dwi from 115.159.237.89 port 44522 ssh2
Apr 26 14:22:09 plex sshd[26467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.237.89
Apr 26 14:22:09 plex sshd[26467]: Invalid user dwi from 115.159.237.89 port 44522
Apr 26 14:22:12 plex sshd[26467]: Failed password for invalid user dwi from 115.159.237.89 port 44522 ssh2
2020-04-27 00:55:16
67.22.223.9 attack
67.22.223.9 has been banned for [spam]
...
2020-04-27 01:13:52
150.109.150.77 attackbotsspam
5x Failed Password
2020-04-27 01:05:11

Recently Reported IPs

1.55.156.7 209.136.54.247 109.180.64.25 131.100.81.159
54.79.206.36 183.217.50.70 205.69.31.157 32.86.96.70
131.163.138.24 222.121.205.7 84.201.154.191 177.154.235.157
165.170.191.62 165.22.203.184 125.168.163.24 219.25.85.84
55.242.31.140 118.106.249.250 165.145.173.228 101.39.72.32