Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.236.42.95 attackbotsspam
SSH Bruteforce attack
2020-09-28 03:05:45
104.236.42.95 attackspam
SSH Bruteforce attack
2020-09-27 19:14:31
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.236.42.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.236.42.145.			IN	A

;; AUTHORITY SECTION:
.			116	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:18:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 145.42.236.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.42.236.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.64.94.211 attackbots
Port 6881 scan denied
2020-02-18 00:53:59
94.83.36.31 attackbots
DATE:2020-02-17 14:35:51, IP:94.83.36.31, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-18 00:31:04
49.249.245.218 attack
1581946647 - 02/17/2020 14:37:27 Host: 49.249.245.218/49.249.245.218 Port: 445 TCP Blocked
2020-02-18 00:42:42
200.69.236.229 attack
Automatic report - SSH Brute-Force Attack
2020-02-18 00:35:55
42.112.125.173 attack
Automatic report - Port Scan Attack
2020-02-18 00:29:15
213.57.174.201 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 00:32:37
134.209.50.169 attackbotsspam
Feb 17 17:17:58 serwer sshd\[25454\]: Invalid user forum from 134.209.50.169 port 47694
Feb 17 17:17:58 serwer sshd\[25454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.50.169
Feb 17 17:17:59 serwer sshd\[25454\]: Failed password for invalid user forum from 134.209.50.169 port 47694 ssh2
...
2020-02-18 00:57:02
37.195.50.41 attack
Feb 17 13:22:25 goofy sshd\[13354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.195.50.41  user=root
Feb 17 13:22:27 goofy sshd\[13354\]: Failed password for root from 37.195.50.41 port 33060 ssh2
Feb 17 13:37:44 goofy sshd\[14067\]: Invalid user hyperic from 37.195.50.41
Feb 17 13:37:44 goofy sshd\[14067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.195.50.41
Feb 17 13:37:45 goofy sshd\[14067\]: Failed password for invalid user hyperic from 37.195.50.41 port 59010 ssh2
2020-02-18 00:15:51
213.57.150.212 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 00:51:07
129.204.180.130 attack
Feb 17 15:32:52 plex sshd[2210]: Invalid user password from 129.204.180.130 port 46584
2020-02-18 00:30:02
213.57.165.123 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 00:42:11
122.100.110.121 attack
" "
2020-02-18 00:13:02
27.219.119.52 attackspam
23/tcp
[2020-02-17]1pkt
2020-02-18 00:42:57
191.6.87.183 attackbotsspam
20/2/17@08:37:48: FAIL: Alarm-Telnet address from=191.6.87.183
20/2/17@08:37:49: FAIL: Alarm-Telnet address from=191.6.87.183
...
2020-02-18 00:12:12
103.66.96.254 attack
$f2bV_matches
2020-02-18 00:46:22

Recently Reported IPs

104.236.41.41 104.236.42.130 104.236.43.158 104.236.42.238
104.236.43.237 104.236.40.54 104.236.44.116 104.236.44.104
104.236.45.108 101.109.51.53 104.236.45.202 104.236.42.153
104.236.45.78 104.236.46.212 104.236.45.100 104.236.46.188
104.236.46.221 104.236.46.214 104.236.48.10 104.236.47.73