Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.26.14.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.26.14.142.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 04:05:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 142.14.26.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.14.26.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.208 attackbotsspam
2019-10-16T15:39:06.141583abusebot-7.cloudsearch.cf sshd\[3850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
2019-10-16 23:39:13
185.10.68.96 attack
10/16/2019-09:46:26.365069 185.10.68.96 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-16 23:33:10
117.33.230.4 attackspambots
SSH brutforce
2019-10-16 23:50:19
178.128.109.82 attackspam
Fail2Ban - SSH Bruteforce Attempt
2019-10-16 23:40:25
37.113.170.62 attack
Automatic report - Banned IP Access
2019-10-16 23:45:49
159.65.133.212 attackbots
2019-10-16T15:13:25.470875abusebot-3.cloudsearch.cf sshd\[30709\]: Invalid user pt from 159.65.133.212 port 44990
2019-10-16 23:29:00
188.113.155.98 attackbotsspam
[portscan] Port scan
2019-10-16 23:11:15
184.105.247.251 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 23:23:55
185.113.141.3 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 23:37:14
103.250.36.113 attackspam
Oct 16 16:48:50 dedicated sshd[27730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.36.113  user=root
Oct 16 16:48:51 dedicated sshd[27730]: Failed password for root from 103.250.36.113 port 47905 ssh2
2019-10-16 23:32:41
184.105.247.239 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 23:12:17
51.68.134.26 attack
TCP Port: 25 _    invalid blocked  barracudacentral also spam-sorbs _  _  _ _ (739)
2019-10-16 23:51:20
46.176.228.249 attackspam
Telnet Server BruteForce Attack
2019-10-16 23:22:35
106.12.30.229 attackspam
$f2bV_matches
2019-10-16 23:52:55
159.65.136.141 attackspam
Automatic report - Banned IP Access
2019-10-16 23:42:35

Recently Reported IPs

104.26.14.14 104.26.14.141 104.26.14.144 104.26.14.143
104.26.14.145 104.26.14.148 104.26.14.150 104.26.14.153
104.26.14.151 104.26.14.154 104.26.14.146 104.26.14.15
104.26.14.149 104.26.14.152 104.26.14.155 104.26.14.156
104.26.14.158 104.26.14.159 104.26.14.157 104.26.14.164