Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.214.148.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.214.148.104.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010401 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 06:33:10 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 104.148.214.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.148.214.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.7.128.74 attackbots
Dec 17 17:37:37 vpn01 sshd[16136]: Failed password for root from 190.7.128.74 port 27871 ssh2
...
2019-12-18 01:16:58
94.181.94.12 attackspam
Dec 17 05:05:47 web9 sshd\[32576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.181.94.12  user=root
Dec 17 05:05:49 web9 sshd\[32576\]: Failed password for root from 94.181.94.12 port 59328 ssh2
Dec 17 05:11:35 web9 sshd\[1155\]: Invalid user quagga from 94.181.94.12
Dec 17 05:11:35 web9 sshd\[1155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.181.94.12
Dec 17 05:11:37 web9 sshd\[1155\]: Failed password for invalid user quagga from 94.181.94.12 port 39398 ssh2
2019-12-18 01:28:29
46.101.94.240 attackbotsspam
Dec 17 19:02:18 sauna sshd[233660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.94.240
Dec 17 19:02:19 sauna sshd[233660]: Failed password for invalid user putzeys from 46.101.94.240 port 50198 ssh2
...
2019-12-18 01:20:56
106.54.248.54 attackspambots
Dec 17 17:35:23 srv206 sshd[24640]: Invalid user streitz from 106.54.248.54
...
2019-12-18 01:31:21
13.82.186.251 attackbotsspam
2019-12-17T15:20:09.544247host3.slimhost.com.ua sshd[1108653]: Invalid user ircbellcore from 13.82.186.251 port 50148
2019-12-17T15:20:09.548792host3.slimhost.com.ua sshd[1108653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.186.251
2019-12-17T15:20:09.544247host3.slimhost.com.ua sshd[1108653]: Invalid user ircbellcore from 13.82.186.251 port 50148
2019-12-17T15:20:11.980634host3.slimhost.com.ua sshd[1108653]: Failed password for invalid user ircbellcore from 13.82.186.251 port 50148 ssh2
2019-12-17T15:27:41.022272host3.slimhost.com.ua sshd[1111564]: Invalid user serveur from 13.82.186.251 port 56414
2019-12-17T15:27:41.029203host3.slimhost.com.ua sshd[1111564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.186.251
2019-12-17T15:27:41.022272host3.slimhost.com.ua sshd[1111564]: Invalid user serveur from 13.82.186.251 port 56414
2019-12-17T15:27:43.511309host3.slimhost.com.ua sshd[1111564]: 
...
2019-12-18 01:26:51
218.232.135.95 attack
$f2bV_matches
2019-12-18 01:13:52
192.3.25.92 attackspambots
Dec 17 17:02:21 localhost sshd\[75566\]: Invalid user cristiano from 192.3.25.92 port 39841
Dec 17 17:02:21 localhost sshd\[75566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.25.92
Dec 17 17:02:23 localhost sshd\[75566\]: Failed password for invalid user cristiano from 192.3.25.92 port 39841 ssh2
Dec 17 17:05:07 localhost sshd\[75657\]: Invalid user isar from 192.3.25.92 port 53621
Dec 17 17:05:07 localhost sshd\[75657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.25.92
...
2019-12-18 01:18:28
95.110.227.64 attack
Dec 17 15:24:25 ns381471 sshd[27858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.227.64
Dec 17 15:24:27 ns381471 sshd[27858]: Failed password for invalid user gx from 95.110.227.64 port 51164 ssh2
2019-12-18 01:12:09
92.119.121.74 attack
Dec 17 05:04:46 ahost sshd[1161]: Invalid user http from 92.119.121.74
Dec 17 05:04:46 ahost sshd[1161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.119.121.74 
Dec 17 05:04:49 ahost sshd[1161]: Failed password for invalid user http from 92.119.121.74 port 53546 ssh2
Dec 17 05:04:49 ahost sshd[1161]: Received disconnect from 92.119.121.74: 11: Bye Bye [preauth]
Dec 17 05:12:36 ahost sshd[2014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.119.121.74  user=backup
Dec 17 05:12:38 ahost sshd[2014]: Failed password for backup from 92.119.121.74 port 36656 ssh2
Dec 17 05:12:38 ahost sshd[2014]: Received disconnect from 92.119.121.74: 11: Bye Bye [preauth]
Dec 17 05:17:51 ahost sshd[2426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.119.121.74  user=r.r
Dec 17 05:17:53 ahost sshd[2426]: Failed password for r.r from 92.119.121.74 port 45714........
------------------------------
2019-12-18 01:24:28
112.85.42.175 attack
Dec 17 18:18:50 jane sshd[10747]: Failed password for root from 112.85.42.175 port 19576 ssh2
Dec 17 18:18:56 jane sshd[10747]: Failed password for root from 112.85.42.175 port 19576 ssh2
...
2019-12-18 01:27:59
79.137.41.208 attack
Automatic report - XMLRPC Attack
2019-12-18 01:09:33
51.68.123.198 attack
2019-12-16 22:32:44 server sshd[11691]: Failed password for invalid user salomo from 51.68.123.198 port 58152 ssh2
2019-12-18 01:03:47
175.119.91.146 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-18 01:33:34
39.110.250.69 attack
Dec 17 17:51:18 loxhost sshd\[12352\]: Invalid user apache from 39.110.250.69 port 36120
Dec 17 17:51:18 loxhost sshd\[12352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.110.250.69
Dec 17 17:51:21 loxhost sshd\[12352\]: Failed password for invalid user apache from 39.110.250.69 port 36120 ssh2
Dec 17 17:57:01 loxhost sshd\[12538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.110.250.69  user=root
Dec 17 17:57:03 loxhost sshd\[12538\]: Failed password for root from 39.110.250.69 port 41672 ssh2
...
2019-12-18 01:18:03
202.29.221.202 attackspam
Dec 17 18:17:38 ns37 sshd[28362]: Failed password for root from 202.29.221.202 port 14357 ssh2
Dec 17 18:17:38 ns37 sshd[28362]: Failed password for root from 202.29.221.202 port 14357 ssh2
Dec 17 18:24:05 ns37 sshd[28715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.221.202
2019-12-18 01:27:16

Recently Reported IPs

181.247.16.192 70.216.73.41 212.227.146.56 42.201.102.228
65.190.217.214 46.144.35.165 133.162.118.129 217.223.147.184
46.217.234.197 86.131.64.198 137.172.252.102 82.196.208.154
14.1.212.169 219.253.118.79 62.119.81.90 141.108.212.182
247.117.14.14 72.68.126.28 131.66.161.51 232.235.186.191