Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.152.130.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.152.130.145.		IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 22:34:25 CST 2022
;; MSG SIZE  rcvd: 108
Host info
145.130.152.104.in-addr.arpa domain name pointer ip-104.152.130-145.static.mvdsl.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.130.152.104.in-addr.arpa	name = ip-104.152.130-145.static.mvdsl.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.255.72.2 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-12/08-11]9pkt,1pt.(tcp)
2019-08-11 21:14:02
121.157.82.214 attackbotsspam
Aug 11 11:21:42 unicornsoft sshd\[22396\]: Invalid user fm from 121.157.82.214
Aug 11 11:21:42 unicornsoft sshd\[22396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.157.82.214
Aug 11 11:21:44 unicornsoft sshd\[22396\]: Failed password for invalid user fm from 121.157.82.214 port 41274 ssh2
2019-08-11 21:50:46
14.43.82.242 attackspambots
Automatic report - Banned IP Access
2019-08-11 21:23:52
219.92.16.81 attackspam
$f2bV_matches
2019-08-11 21:39:09
71.202.241.115 attackbots
Fail2Ban - SSH Bruteforce Attempt
2019-08-11 21:38:48
183.101.8.161 attackspam
Automatic report - Banned IP Access
2019-08-11 21:21:48
92.63.194.148 attackbotsspam
firewall-block, port(s): 18730/tcp, 18731/tcp
2019-08-11 21:41:17
161.0.102.61 attack
SSH bruteforce
2019-08-11 21:08:05
89.35.39.113 attack
firewall-block, port(s): 389/tcp, 11211/tcp
2019-08-11 21:43:54
189.112.216.163 attackspam
Automatic report - Port Scan Attack
2019-08-11 21:49:36
62.210.105.116 attack
Aug 11 13:32:45 db sshd\[28118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-105-116.rev.poneytelecom.eu  user=root
Aug 11 13:32:47 db sshd\[28118\]: Failed password for root from 62.210.105.116 port 34923 ssh2
Aug 11 13:32:51 db sshd\[28120\]: Invalid user leo from 62.210.105.116
Aug 11 13:32:51 db sshd\[28120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-105-116.rev.poneytelecom.eu 
Aug 11 13:32:52 db sshd\[28120\]: Failed password for invalid user leo from 62.210.105.116 port 32953 ssh2
...
2019-08-11 21:08:48
37.53.70.60 attackspambots
23/tcp 23/tcp
[2019-08-09/11]2pkt
2019-08-11 21:47:09
190.128.149.66 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-11 06:20:31,404 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.128.149.66)
2019-08-11 21:30:48
76.20.69.183 attackbots
Reported by AbuseIPDB proxy server.
2019-08-11 21:27:00
116.49.86.12 attackspam
23/tcp 23/tcp
[2019-08-07/11]2pkt
2019-08-11 21:53:00

Recently Reported IPs

18.223.110.187 88.208.242.172 62.4.23.114 225.207.23.204
101.43.34.95 162.234.16.41 134.195.121.105 169.150.206.172
179.149.37.243 20.101.69.68 142.93.132.237 164.92.177.191
180.193.186.26 152.32.175.201 103.112.252.254 89.108.103.214
214.253.129.79 51.159.134.210 178.128.206.133 62.182.86.239