Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.105.145.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.105.145.247.		IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092301 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 24 08:26:16 CST 2024
;; MSG SIZE  rcvd: 108
Host info
247.145.105.104.in-addr.arpa domain name pointer a104-105-145-247.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
247.145.105.104.in-addr.arpa	name = a104-105-145-247.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.162.199.128 attackbots
(CT) IP 139.162.199.128 (GB/United Kingdom/139.162.199.128.li.binaryedge.ninja) found to have 434 connections; ID: DAN
2020-06-30 08:18:44
31.58.57.86 attackspam
29.06.2020 21:45:55 - Wordpress fail 
Detected by ELinOX-ALM
2020-06-30 08:23:45
13.91.19.166 attack
s
2020-06-30 08:37:22
106.225.219.145 attackspambots
Unauthorized connection attempt from IP address 106.225.219.145 on Port 445(SMB)
2020-06-30 08:29:40
62.201.217.227 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-30 08:45:27
88.81.51.126 attack
Honeypot attack, port: 445, PTR: dyn-51-126.fttbee.kis.ru.
2020-06-30 08:55:18
188.254.0.2 attack
Jun 30 02:42:29 ns382633 sshd\[18437\]: Invalid user lwq from 188.254.0.2 port 55598
Jun 30 02:42:29 ns382633 sshd\[18437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.2
Jun 30 02:42:31 ns382633 sshd\[18437\]: Failed password for invalid user lwq from 188.254.0.2 port 55598 ssh2
Jun 30 02:50:38 ns382633 sshd\[19980\]: Invalid user runo from 188.254.0.2 port 39866
Jun 30 02:50:38 ns382633 sshd\[19980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.2
2020-06-30 08:51:42
120.92.212.238 attackspambots
SSH / Telnet Brute Force Attempts on Honeypot
2020-06-30 08:39:13
116.24.33.60 attack
1593465453 - 06/29/2020 23:17:33 Host: 116.24.33.60/116.24.33.60 Port: 445 TCP Blocked
2020-06-30 08:38:56
72.14.80.49 attack
Attempted connection to port 9530.
2020-06-30 08:43:08
151.0.36.178 attackspambots
Attempted connection to port 8080.
2020-06-30 08:57:13
112.250.182.24 attack
DATE:2020-06-29 21:45:37, IP:112.250.182.24, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-06-30 08:41:54
49.230.68.27 attack
Unauthorized connection attempt from IP address 49.230.68.27 on Port 445(SMB)
2020-06-30 08:25:41
147.30.95.4 attackbotsspam
Unauthorized connection attempt from IP address 147.30.95.4 on Port 445(SMB)
2020-06-30 08:47:16
198.200.43.183 attackspam
Unauthorized connection attempt from IP address 198.200.43.183 on Port 445(SMB)
2020-06-30 08:53:25

Recently Reported IPs

240.10.178.175 14.19.43.57 111.229.140.38 250.32.96.86
161.114.255.111 203.164.34.6 250.93.164.171 222.19.81.53
116.62.101.1 249.227.74.4 187.39.77.27 178.11.79.54
31.174.47.206 23.225.223.126 231.137.120.165 218.21.163.246
45.158.180.213 82.158.83.164 202.137.156.53 211.234.145.6