Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.45.134.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.45.134.121.			IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 00:40:38 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 121.134.45.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.134.45.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.221.50.99 attackspam
xmlrpc attack
2020-08-27 21:38:17
221.12.101.123 attackspam
firewall-block, port(s): 1433/tcp
2020-08-27 21:10:10
51.77.77.144 attackbots
Breathalyzer SPAM
2020-08-27 21:12:48
194.61.24.177 attack
Aug 27 15:02:50 ift sshd\[47412\]: Invalid user 0 from 194.61.24.177Aug 27 15:02:52 ift sshd\[47412\]: Failed password for invalid user 0 from 194.61.24.177 port 16358 ssh2Aug 27 15:02:55 ift sshd\[47451\]: Invalid user 22 from 194.61.24.177Aug 27 15:02:57 ift sshd\[47451\]: Failed password for invalid user 22 from 194.61.24.177 port 25184 ssh2Aug 27 15:03:02 ift sshd\[47451\]: Failed password for invalid user 22 from 194.61.24.177 port 25184 ssh2
...
2020-08-27 21:43:08
222.186.173.154 attackbotsspam
Aug 27 12:49:34 * sshd[5755]: Failed password for root from 222.186.173.154 port 33308 ssh2
Aug 27 12:49:37 * sshd[5755]: Failed password for root from 222.186.173.154 port 33308 ssh2
2020-08-27 21:18:53
61.133.232.249 attackbots
Aug 27 08:34:30 host sshd\[3111\]: Failed password for root from 61.133.232.249 port 17060 ssh2
Aug 27 08:43:14 host sshd\[5044\]: Failed password for root from 61.133.232.249 port 64176 ssh2
Aug 27 09:02:39 host sshd\[9049\]: Invalid user website from 61.133.232.249
Aug 27 09:02:39 host sshd\[9049\]: Failed password for invalid user website from 61.133.232.249 port 11197 ssh2
...
2020-08-27 21:44:00
198.27.90.106 attack
Aug 27 10:14:58 *** sshd[17266]: Invalid user csgoserver from 198.27.90.106
2020-08-27 21:10:32
217.182.90.84 attack
Time:     Thu Aug 27 07:02:36 2020 +0200
IP:       217.182.90.84 (FR/France/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 18 15:01:58 mail-03 sshd[13206]: Invalid user owen from 217.182.90.84 port 48764
Aug 18 15:02:00 mail-03 sshd[13206]: Failed password for invalid user owen from 217.182.90.84 port 48764 ssh2
Aug 18 15:13:05 mail-03 sshd[13943]: Invalid user ftpadmin from 217.182.90.84 port 35442
Aug 18 15:13:06 mail-03 sshd[13943]: Failed password for invalid user ftpadmin from 217.182.90.84 port 35442 ssh2
Aug 18 15:17:20 mail-03 sshd[14233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.90.84  user=root
2020-08-27 21:03:16
171.8.197.232 attackspambots
Unauthorized connection attempt from IP address 171.8.197.232 on Port 445(SMB)
2020-08-27 21:35:59
191.53.248.21 attackbots
(smtpauth) Failed SMTP AUTH login from 191.53.248.21 (BR/Brazil/191-53-248-21.nvs-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-28 04:00:36 plain authenticator failed for ([191.53.248.21]) [191.53.248.21]: 535 Incorrect authentication data (set_id=info@negintabas.ir)
2020-08-27 21:40:07
157.55.214.174 attack
Invalid user mfa from 157.55.214.174 port 54998
2020-08-27 21:38:52
92.222.93.104 attackbots
Aug 27 12:56:15 lnxded64 sshd[32377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.93.104
2020-08-27 21:27:53
151.20.32.176 attack
Automatic report - Port Scan Attack
2020-08-27 21:39:54
118.113.88.54 attackbotsspam
Unauthorized connection attempt from IP address 118.113.88.54 on Port 445(SMB)
2020-08-27 21:24:44
217.11.188.116 attackspam
Unauthorized connection attempt from IP address 217.11.188.116 on Port 445(SMB)
2020-08-27 21:07:00

Recently Reported IPs

103.45.122.54 103.45.161.142 103.45.180.8 103.45.184.76
103.45.233.166 103.45.248.151 103.45.249.169 103.45.249.178
103.45.249.54 203.0.113.29 103.45.66.88 103.46.141.84
103.46.203.12 103.47.132.27 103.47.147.197 103.47.173.131
103.47.173.25 103.47.175.202 103.47.216.183 103.47.218.118