Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.104.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.239.104.14.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:27:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
14.104.239.145.in-addr.arpa domain name pointer cheapdigitaldownload.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.104.239.145.in-addr.arpa	name = cheapdigitaldownload.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.246.191.130 attackbotsspam
Aug 15 20:47:59 srv-4 sshd\[20549\]: Invalid user qhsupport from 140.246.191.130
Aug 15 20:47:59 srv-4 sshd\[20549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.191.130
Aug 15 20:48:01 srv-4 sshd\[20549\]: Failed password for invalid user qhsupport from 140.246.191.130 port 9375 ssh2
...
2019-08-16 02:32:59
45.125.65.96 attackspam
Rude login attack (13 tries in 1d)
2019-08-16 03:04:00
185.176.27.34 attackbots
Port scan on 6 port(s): 25995 25996 25997 26098 26099 26100
2019-08-16 02:36:38
183.101.216.229 attack
Aug 15 10:48:32 TORMINT sshd\[11057\]: Invalid user webroot1 from 183.101.216.229
Aug 15 10:48:32 TORMINT sshd\[11057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.101.216.229
Aug 15 10:48:34 TORMINT sshd\[11057\]: Failed password for invalid user webroot1 from 183.101.216.229 port 60178 ssh2
...
2019-08-16 03:08:18
133.130.89.115 attack
Aug 15 10:30:46 TORMINT sshd\[9639\]: Invalid user seafile from 133.130.89.115
Aug 15 10:30:46 TORMINT sshd\[9639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.115
Aug 15 10:30:48 TORMINT sshd\[9639\]: Failed password for invalid user seafile from 133.130.89.115 port 36296 ssh2
...
2019-08-16 02:51:43
161.53.116.99 attack
firewall-block, port(s): 445/tcp
2019-08-16 02:48:32
112.242.138.13 attackbots
Seq 2995002506
2019-08-16 02:50:04
123.177.23.133 attack
Aug 15 16:56:23 srv206 sshd[18214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.177.23.133  user=root
Aug 15 16:56:26 srv206 sshd[18214]: Failed password for root from 123.177.23.133 port 4039 ssh2
...
2019-08-16 03:09:12
2001:4801:7824:103:be76:4eff:fe10:4f39 attackspam
xmlrpc attack
2019-08-16 03:11:10
45.4.148.14 attackbotsspam
Aug 15 20:34:58 eventyay sshd[5222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.4.148.14
Aug 15 20:35:00 eventyay sshd[5222]: Failed password for invalid user cst from 45.4.148.14 port 45870 ssh2
Aug 15 20:41:22 eventyay sshd[6974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.4.148.14
...
2019-08-16 03:03:10
78.33.237.114 attackbots
Aug 15 12:20:13 srv-4 sshd\[5980\]: Invalid user admin from 78.33.237.114
Aug 15 12:20:13 srv-4 sshd\[5980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.33.237.114
Aug 15 12:20:15 srv-4 sshd\[5980\]: Failed password for invalid user admin from 78.33.237.114 port 59938 ssh2
...
2019-08-16 02:52:44
5.157.96.66 attackspambots
2019/08/15 09:20:12 \[error\] 3563\#0: \*29829 An error occurred in mail zmauth: user not found:barszcz37@*fathog.com while SSL handshaking to lookup handler, client: 5.157.96.66:60254, server: 45.79.145.195:993, login: "barszcz37@*fathog.com"
2019-08-16 02:49:06
221.231.74.192 attackspambots
frenzy
2019-08-16 02:37:12
217.77.48.29 attack
Aug 15 18:11:16 SilenceServices sshd[31404]: Failed password for root from 217.77.48.29 port 47701 ssh2
Aug 15 18:17:29 SilenceServices sshd[3747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.77.48.29
Aug 15 18:17:31 SilenceServices sshd[3747]: Failed password for invalid user caitlen from 217.77.48.29 port 39480 ssh2
2019-08-16 03:18:46
112.85.95.0 attackbots
Aug 15 16:19:39 ncomp sshd[7406]: Invalid user admin from 112.85.95.0
Aug 15 16:19:39 ncomp sshd[7406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.95.0
Aug 15 16:19:39 ncomp sshd[7406]: Invalid user admin from 112.85.95.0
Aug 15 16:19:41 ncomp sshd[7406]: Failed password for invalid user admin from 112.85.95.0 port 29224 ssh2
2019-08-16 03:06:03

Recently Reported IPs

145.239.101.228 145.239.104.240 145.239.104.58 145.239.105.254
145.239.105.39 145.239.11.169 145.239.11.188 145.239.11.207
145.239.118.165 145.239.12.177 145.239.12.239 145.239.12.53
145.239.12.93 145.239.120.62 145.239.121.108 145.239.121.48
145.239.122.18 145.239.122.35 145.239.124.205 145.239.124.32