Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cottage Grove

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.4.144.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.4.144.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 07:30:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
108.144.4.107.in-addr.arpa domain name pointer c-107-4-144-108.hsd1.mn.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.144.4.107.in-addr.arpa	name = c-107-4-144-108.hsd1.mn.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.255.183.34 attackspambots
Unauthorized connection attempt from IP address 88.255.183.34 on Port 445(SMB)
2019-10-24 20:01:40
182.61.46.62 attackspambots
Oct 24 11:52:56 hcbbdb sshd\[11605\]: Invalid user abdi from 182.61.46.62
Oct 24 11:52:56 hcbbdb sshd\[11605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.62
Oct 24 11:52:57 hcbbdb sshd\[11605\]: Failed password for invalid user abdi from 182.61.46.62 port 58862 ssh2
Oct 24 11:58:14 hcbbdb sshd\[12169\]: Invalid user liziere123 from 182.61.46.62
Oct 24 11:58:14 hcbbdb sshd\[12169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.62
2019-10-24 19:59:14
203.190.55.203 attackspam
Oct 24 10:49:12 ip-172-31-62-245 sshd\[24526\]: Invalid user PrintScreen from 203.190.55.203\
Oct 24 10:49:15 ip-172-31-62-245 sshd\[24526\]: Failed password for invalid user PrintScreen from 203.190.55.203 port 59908 ssh2\
Oct 24 10:53:26 ip-172-31-62-245 sshd\[24537\]: Invalid user hannahmontana from 203.190.55.203\
Oct 24 10:53:28 ip-172-31-62-245 sshd\[24537\]: Failed password for invalid user hannahmontana from 203.190.55.203 port 50986 ssh2\
Oct 24 10:57:25 ip-172-31-62-245 sshd\[24568\]: Invalid user abcabcd1234%\^\&\* from 203.190.55.203\
2019-10-24 19:36:00
45.82.32.240 attack
Lines containing failures of 45.82.32.240
Oct 24 04:04:56 shared04 postfix/smtpd[16754]: connect from outofdate.oliviertylczak.com[45.82.32.240]
Oct 24 04:04:56 shared04 policyd-spf[19007]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.82.32.240; helo=outofdate.claurelhair.co; envelope-from=x@x
Oct x@x
Oct 24 04:04:56 shared04 postfix/smtpd[16754]: disconnect from outofdate.oliviertylczak.com[45.82.32.240] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Oct 24 04:05:48 shared04 postfix/smtpd[18748]: connect from outofdate.oliviertylczak.com[45.82.32.240]
Oct 24 04:05:48 shared04 policyd-spf[18763]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.82.32.240; helo=outofdate.claurelhair.co; envelope-from=x@x
Oct x@x
Oct 24 04:05:48 shared04 postfix/smtpd[18748]: disconnect from outofdate.oliviertylczak.com[45.82.32.240] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Oct 24 04:06:22 shared04 postfi........
------------------------------
2019-10-24 19:43:43
49.88.112.72 attackbots
Oct 24 14:01:54 mail sshd[2304]: Failed password for root from 49.88.112.72 port 57865 ssh2
Oct 24 14:01:56 mail sshd[2304]: Failed password for root from 49.88.112.72 port 57865 ssh2
Oct 24 14:01:59 mail sshd[2304]: Failed password for root from 49.88.112.72 port 57865 ssh2
2019-10-24 20:14:39
139.59.89.7 attackspambots
2019-10-24T12:09:39.928081shield sshd\[22408\]: Invalid user pop3 from 139.59.89.7 port 37850
2019-10-24T12:09:39.931495shield sshd\[22408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.89.7
2019-10-24T12:09:41.154274shield sshd\[22408\]: Failed password for invalid user pop3 from 139.59.89.7 port 37850 ssh2
2019-10-24T12:14:23.496087shield sshd\[23060\]: Invalid user xerox from 139.59.89.7 port 49456
2019-10-24T12:14:23.504819shield sshd\[23060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.89.7
2019-10-24 20:20:02
213.149.178.143 attackspambots
Automatic report - Banned IP Access
2019-10-24 19:52:07
85.105.144.50 attack
Automatic report - Banned IP Access
2019-10-24 20:00:49
113.212.117.17 attackbots
Oct 24 03:48:55 **** sshd[24865]: Did not receive identification string from 113.212.117.17 port 58965
2019-10-24 19:53:02
103.99.113.62 attackspam
Oct 24 13:09:28 XXX sshd[33937]: Invalid user baldwin from 103.99.113.62 port 53132
2019-10-24 20:10:55
197.204.44.196 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/197.204.44.196/ 
 
 DZ - 1H : (11)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DZ 
 NAME ASN : ASN36947 
 
 IP : 197.204.44.196 
 
 CIDR : 197.204.0.0/16 
 
 PREFIX COUNT : 408 
 
 UNIQUE IP COUNT : 4353792 
 
 
 ATTACKS DETECTED ASN36947 :  
  1H - 1 
  3H - 1 
  6H - 3 
 12H - 7 
 24H - 11 
 
 DateTime : 2019-10-24 13:59:57 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-24 20:05:16
51.38.237.78 attackspam
2019-10-24T11:56:29.140045shield sshd\[20216\]: Invalid user aladin from 51.38.237.78 port 41792
2019-10-24T11:56:29.144180shield sshd\[20216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.ip-51-38-237.eu
2019-10-24T11:56:31.246480shield sshd\[20216\]: Failed password for invalid user aladin from 51.38.237.78 port 41792 ssh2
2019-10-24T12:00:21.410141shield sshd\[20774\]: Invalid user qweasdzxc123456789 from 51.38.237.78 port 51864
2019-10-24T12:00:21.414491shield sshd\[20774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.ip-51-38-237.eu
2019-10-24 20:02:00
187.0.211.99 attackbots
Automatic report - Banned IP Access
2019-10-24 19:54:15
149.56.99.85 attack
Oct 24 08:05:04 thevastnessof sshd[11602]: Failed password for root from 149.56.99.85 port 40996 ssh2
...
2019-10-24 19:36:27
173.220.206.162 attack
Oct 24 11:30:10 XXXXXX sshd[22374]: Invalid user user from 173.220.206.162 port 44713
2019-10-24 20:05:58

Recently Reported IPs

166.189.182.173 155.240.148.159 39.64.6.236 79.240.134.155
60.226.200.102 44.154.145.248 59.230.91.224 26.229.12.232
17.214.64.48 141.236.112.175 73.212.112.98 159.91.122.216
28.73.110.51 19.88.4.153 119.132.232.202 40.23.127.30
110.100.243.127 7.124.150.150 91.53.222.194 87.37.173.152