Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: Microplex PTY LTD

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.104.144.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63872
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;58.104.144.143.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 07:47:28 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 143.144.104.58.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 143.144.104.58.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
185.216.34.230 attackbotsspam
Contact form has url
2020-04-01 01:44:34
93.35.203.128 attackbots
Email rejected due to spam filtering
2020-04-01 01:32:39
58.219.112.212 attackspambots
(ftpd) Failed FTP login from 58.219.112.212 (CN/China/-): 10 in the last 3600 secs
2020-04-01 01:36:37
67.207.88.180 attack
Apr  1 00:26:03 webhost01 sshd[5447]: Failed password for root from 67.207.88.180 port 55602 ssh2
...
2020-04-01 01:30:44
42.2.88.146 attackspambots
Honeypot attack, port: 5555, PTR: 42-2-88-146.static.netvigator.com.
2020-04-01 01:54:14
206.41.178.218 attack
Automatic report - Banned IP Access
2020-04-01 01:23:02
203.177.60.238 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-01 01:33:45
46.242.15.5 attackspambots
Unauthorized connection attempt detected from IP address 46.242.15.5 to port 445
2020-04-01 01:51:46
27.72.47.174 attackbotsspam
Unauthorized connection attempt from IP address 27.72.47.174 on Port 445(SMB)
2020-04-01 01:49:23
119.96.189.97 attackbots
2020-03-31T12:21:17.670454abusebot-8.cloudsearch.cf sshd[14107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.189.97  user=root
2020-03-31T12:21:20.265830abusebot-8.cloudsearch.cf sshd[14107]: Failed password for root from 119.96.189.97 port 55430 ssh2
2020-03-31T12:24:45.020423abusebot-8.cloudsearch.cf sshd[14387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.189.97  user=root
2020-03-31T12:24:47.700950abusebot-8.cloudsearch.cf sshd[14387]: Failed password for root from 119.96.189.97 port 46323 ssh2
2020-03-31T12:28:00.988971abusebot-8.cloudsearch.cf sshd[14563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.189.97  user=root
2020-03-31T12:28:02.576040abusebot-8.cloudsearch.cf sshd[14563]: Failed password for root from 119.96.189.97 port 37214 ssh2
2020-03-31T12:31:13.096412abusebot-8.cloudsearch.cf sshd[14742]: pam_unix(sshd:auth): authe
...
2020-04-01 01:23:21
111.230.141.189 attackbots
Mar 31 15:37:59 legacy sshd[15743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.141.189
Mar 31 15:38:01 legacy sshd[15743]: Failed password for invalid user sgs from 111.230.141.189 port 44742 ssh2
Mar 31 15:41:29 legacy sshd[15803]: Failed password for root from 111.230.141.189 port 55444 ssh2
...
2020-04-01 01:35:49
14.39.255.250 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-04-01 02:02:48
139.59.84.29 attack
Mar 31 04:31:20 cumulus sshd[29787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29  user=r.r
Mar 31 04:31:23 cumulus sshd[29787]: Failed password for r.r from 139.59.84.29 port 49410 ssh2
Mar 31 04:31:23 cumulus sshd[29787]: Received disconnect from 139.59.84.29 port 49410:11: Bye Bye [preauth]
Mar 31 04:31:23 cumulus sshd[29787]: Disconnected from 139.59.84.29 port 49410 [preauth]
Mar 31 04:44:30 cumulus sshd[30753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29  user=r.r
Mar 31 04:44:33 cumulus sshd[30753]: Failed password for r.r from 139.59.84.29 port 55432 ssh2
Mar 31 04:44:33 cumulus sshd[30753]: Received disconnect from 139.59.84.29 port 55432:11: Bye Bye [preauth]
Mar 31 04:44:33 cumulus sshd[30753]: Disconnected from 139.59.84.29 port 55432 [preauth]
Mar 31 04:49:16 cumulus sshd[31032]: Invalid user user from 139.59.84.29 port 50670
Mar 31 04:49:16 cumu........
-------------------------------
2020-04-01 01:49:06
222.186.42.137 attackbotsspam
2020-03-31T17:34:40.012460abusebot-6.cloudsearch.cf sshd[26219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-03-31T17:34:42.460150abusebot-6.cloudsearch.cf sshd[26219]: Failed password for root from 222.186.42.137 port 45331 ssh2
2020-03-31T17:34:44.541223abusebot-6.cloudsearch.cf sshd[26219]: Failed password for root from 222.186.42.137 port 45331 ssh2
2020-03-31T17:34:40.012460abusebot-6.cloudsearch.cf sshd[26219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-03-31T17:34:42.460150abusebot-6.cloudsearch.cf sshd[26219]: Failed password for root from 222.186.42.137 port 45331 ssh2
2020-03-31T17:34:44.541223abusebot-6.cloudsearch.cf sshd[26219]: Failed password for root from 222.186.42.137 port 45331 ssh2
2020-03-31T17:34:40.012460abusebot-6.cloudsearch.cf sshd[26219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss
...
2020-04-01 01:40:26
117.50.96.235 attackbotsspam
2020-03-31T18:30:26.595159rocketchat.forhosting.nl sshd[3845]: Failed password for root from 117.50.96.235 port 35268 ssh2
2020-03-31T18:33:59.578817rocketchat.forhosting.nl sshd[3868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.96.235  user=root
2020-03-31T18:34:01.319071rocketchat.forhosting.nl sshd[3868]: Failed password for root from 117.50.96.235 port 38714 ssh2
...
2020-04-01 01:35:25

Recently Reported IPs

185.229.22.55 120.38.202.182 103.176.15.206 221.229.190.148
205.150.187.55 37.170.122.248 56.31.203.93 192.161.190.153
104.177.229.247 28.222.230.110 238.31.49.175 255.237.248.31
90.199.179.14 190.238.213.195 29.124.146.70 107.173.194.252
74.154.127.101 37.106.114.110 164.53.187.98 131.103.125.16