Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.24.14.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.24.14.11.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:49:42 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 11.14.24.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.14.24.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.99.63.181 attack
Lines containing failures of 46.99.63.181
Jan 12 22:11:57 shared05 sshd[26868]: Invalid user user from 46.99.63.181 port 17088
Jan 12 22:11:57 shared05 sshd[26868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.99.63.181
Jan 12 22:11:59 shared05 sshd[26868]: Failed password for invalid user user from 46.99.63.181 port 17088 ssh2
Jan 12 22:11:59 shared05 sshd[26868]: Connection closed by invalid user user 46.99.63.181 port 17088 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.99.63.181
2020-01-13 09:09:28
94.177.189.102 attack
Unauthorized connection attempt detected from IP address 94.177.189.102 to port 2220 [J]
2020-01-13 09:19:28
217.8.86.86 attackspambots
Jan 12 22:03:36 extapp sshd[8423]: Invalid user admin from 217.8.86.86
Jan 12 22:03:38 extapp sshd[8423]: Failed password for invalid user admin from 217.8.86.86 port 53430 ssh2
Jan 12 22:12:24 extapp sshd[12975]: Invalid user toni from 217.8.86.86


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.8.86.86
2020-01-13 09:11:16
193.8.80.119 attack
Unauthorized connection attempt detected from IP address 193.8.80.119 to port 2220 [J]
2020-01-13 09:24:33
46.101.72.145 attack
Unauthorized connection attempt detected from IP address 46.101.72.145 to port 2220 [J]
2020-01-13 08:55:41
218.3.139.85 attack
Unauthorized connection attempt detected from IP address 218.3.139.85 to port 2220 [J]
2020-01-13 09:26:31
170.83.146.82 attackbots
Automatic report - Port Scan Attack
2020-01-13 09:31:11
51.77.192.100 attackbotsspam
Unauthorized connection attempt detected from IP address 51.77.192.100 to port 2220 [J]
2020-01-13 09:23:50
122.3.88.147 attack
Unauthorized connection attempt detected from IP address 122.3.88.147 to port 2220 [J]
2020-01-13 09:13:58
200.29.132.214 attack
" "
2020-01-13 09:17:09
138.197.151.248 attackspambots
2020-01-12 22:50:48,567 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 138.197.151.248
2020-01-12 23:23:54,921 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 138.197.151.248
2020-01-12 23:58:58,943 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 138.197.151.248
2020-01-13 00:34:32,947 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 138.197.151.248
2020-01-13 01:09:59,040 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 138.197.151.248
...
2020-01-13 09:05:51
115.192.70.174 attackspambots
Unauthorised access (Jan 12) SRC=115.192.70.174 LEN=40 TTL=53 ID=29694 TCP DPT=23 WINDOW=54253 SYN
2020-01-13 08:59:32
106.54.128.79 attackspam
Jan 12 16:06:41 cumulus sshd[22568]: Invalid user edu from 106.54.128.79 port 60408
Jan 12 16:06:41 cumulus sshd[22568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.128.79
Jan 12 16:06:42 cumulus sshd[22568]: Failed password for invalid user edu from 106.54.128.79 port 60408 ssh2
Jan 12 16:06:43 cumulus sshd[22568]: Received disconnect from 106.54.128.79 port 60408:11: Bye Bye [preauth]
Jan 12 16:06:43 cumulus sshd[22568]: Disconnected from 106.54.128.79 port 60408 [preauth]
Jan 12 16:13:47 cumulus sshd[23043]: Invalid user tomas from 106.54.128.79 port 44544
Jan 12 16:13:47 cumulus sshd[23043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.128.79
Jan 12 16:13:49 cumulus sshd[23043]: Failed password for invalid user tomas from 106.54.128.79 port 44544 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.54.128.79
2020-01-13 09:18:37
198.23.61.43 attackbots
Wordpress Admin Login attack
2020-01-13 09:19:06
35.220.212.66 attackbots
WordPress brute force
2020-01-13 09:15:49

Recently Reported IPs

104.24.143.17 104.24.143.18 104.24.144.24 104.24.145.14
104.24.145.24 104.24.144.14 104.24.15.11 104.24.153.16
104.24.152.16 104.24.156.14 104.24.156.12 104.24.160.13
104.24.16.43 104.24.157.14 104.24.157.12 104.24.16.72
104.24.160.3 104.24.161.13 104.24.160.6 104.24.161.3