Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.114.104.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27680
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.114.104.12.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 02:29:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
12.104.114.46.in-addr.arpa domain name pointer dynamic-046-114-104-012.46.114.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.104.114.46.in-addr.arpa	name = dynamic-046-114-104-012.46.114.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
204.8.156.142 attack
<6 unauthorized SSH connections
2019-08-14 16:16:54
189.7.17.61 attackspam
Aug 14 08:53:48 XXX sshd[52357]: Invalid user quest from 189.7.17.61 port 49944
2019-08-14 16:33:34
59.36.75.227 attackspam
Aug 14 08:50:33 mail sshd\[30684\]: Failed password for invalid user deploy from 59.36.75.227 port 39494 ssh2
Aug 14 09:09:48 mail sshd\[31022\]: Invalid user reich from 59.36.75.227 port 40826
Aug 14 09:09:48 mail sshd\[31022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.75.227
...
2019-08-14 16:20:15
222.186.52.89 attackbots
Aug 14 10:47:23 dev0-dcde-rnet sshd[22554]: Failed password for root from 222.186.52.89 port 16892 ssh2
Aug 14 10:47:32 dev0-dcde-rnet sshd[22556]: Failed password for root from 222.186.52.89 port 45812 ssh2
2019-08-14 16:47:50
5.135.182.84 attackspambots
Aug 14 08:24:54 XXX sshd[51244]: Invalid user filter from 5.135.182.84 port 53928
2019-08-14 16:04:04
104.206.128.66 attack
Honeypot hit.
2019-08-14 16:17:31
60.250.221.50 attackspambots
Aug 14 08:57:40 XXX sshd[52596]: Invalid user nscd from 60.250.221.50 port 56782
2019-08-14 16:26:46
96.1.72.4 attack
Aug 14 04:58:22 vmd17057 sshd\[13227\]: Invalid user tabatha from 96.1.72.4 port 45050
Aug 14 04:58:22 vmd17057 sshd\[13227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.1.72.4
Aug 14 04:58:24 vmd17057 sshd\[13227\]: Failed password for invalid user tabatha from 96.1.72.4 port 45050 ssh2
...
2019-08-14 16:10:35
201.48.233.195 attack
Aug 14 06:22:37 lnxded64 sshd[15154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.233.195
2019-08-14 16:18:06
134.175.89.186 attackspambots
Aug 14 03:54:51 debian sshd\[15996\]: Invalid user test from 134.175.89.186 port 56866
Aug 14 03:54:51 debian sshd\[15996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.89.186
Aug 14 03:54:54 debian sshd\[15996\]: Failed password for invalid user test from 134.175.89.186 port 56866 ssh2
...
2019-08-14 16:42:27
106.13.15.153 attackbots
Aug 14 02:20:10 xtremcommunity sshd\[586\]: Invalid user xxx from 106.13.15.153 port 40178
Aug 14 02:20:10 xtremcommunity sshd\[586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.15.153
Aug 14 02:20:12 xtremcommunity sshd\[586\]: Failed password for invalid user xxx from 106.13.15.153 port 40178 ssh2
Aug 14 02:27:23 xtremcommunity sshd\[854\]: Invalid user word from 106.13.15.153 port 58426
Aug 14 02:27:23 xtremcommunity sshd\[854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.15.153
...
2019-08-14 16:27:22
159.203.122.149 attack
Aug 14 09:17:06 lnxded64 sshd[27701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.122.149
2019-08-14 16:21:56
51.38.234.54 attackspambots
Aug 14 08:49:31 XXX sshd[52068]: Invalid user abt from 51.38.234.54 port 55810
2019-08-14 16:13:10
187.188.148.50 attack
Aug 14 08:46:26 XXX sshd[51876]: Invalid user messagebus from 187.188.148.50 port 10906
2019-08-14 16:28:27
96.23.98.149 attackbotsspam
Aug 14 07:22:36 db sshd\[10314\]: Invalid user cf from 96.23.98.149
Aug 14 07:22:36 db sshd\[10314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=modemcable149.98-23-96.mc.videotron.ca 
Aug 14 07:22:38 db sshd\[10314\]: Failed password for invalid user cf from 96.23.98.149 port 46130 ssh2
Aug 14 07:30:17 db sshd\[10431\]: Invalid user flatron from 96.23.98.149
Aug 14 07:30:17 db sshd\[10431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=modemcable149.98-23-96.mc.videotron.ca 
...
2019-08-14 16:46:58

Recently Reported IPs

168.232.165.235 60.31.91.246 148.0.3.17 64.252.67.23
183.182.115.44 60.189.104.204 51.75.62.236 158.148.234.85
34.219.17.228 113.134.203.179 5.168.75.32 179.135.181.19
43.154.203.244 59.47.140.242 188.6.95.37 159.203.44.173
130.162.151.15 14.204.157.85 178.197.224.111 5.25.158.77