Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.157.159.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.157.159.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 23:12:12 CST 2025
;; MSG SIZE  rcvd: 108
Host info
145.159.157.104.in-addr.arpa domain name pointer host-104-157-159-145.dyn.295.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.159.157.104.in-addr.arpa	name = host-104-157-159-145.dyn.295.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.212.3.118 attackbots
Automatic report - Port Scan Attack
2020-07-04 06:31:30
217.107.34.58 attackbotsspam
Jul  3 18:11:30 firewall sshd[704]: Invalid user jenkins from 217.107.34.58
Jul  3 18:11:33 firewall sshd[704]: Failed password for invalid user jenkins from 217.107.34.58 port 41096 ssh2
Jul  3 18:11:57 firewall sshd[714]: Invalid user testuser from 217.107.34.58
...
2020-07-04 07:05:41
5.196.75.47 attack
Jul  3 18:22:44 lanister sshd[24040]: Invalid user tom from 5.196.75.47
Jul  3 18:22:44 lanister sshd[24040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.47
Jul  3 18:22:44 lanister sshd[24040]: Invalid user tom from 5.196.75.47
Jul  3 18:22:45 lanister sshd[24040]: Failed password for invalid user tom from 5.196.75.47 port 43176 ssh2
2020-07-04 06:59:27
23.129.64.100 attackbotsspam
Unauthorized connection attempt detected from IP address 23.129.64.100 to port 3310
2020-07-04 06:52:42
137.74.159.147 attack
Jul  3 16:58:43 Host-KLAX-C sshd[26999]: Invalid user jamesm from 137.74.159.147 port 47916
...
2020-07-04 07:02:14
83.97.20.35 attack
Port scan on 14 port(s): 82 1025 1701 2080 2083 2086 2087 5001 5555 5985 7777 8000 8001 49152
2020-07-04 06:52:19
132.145.128.157 attackspam
Jul  3 22:01:55 sso sshd[21703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.128.157
Jul  3 22:01:57 sso sshd[21703]: Failed password for invalid user dpp from 132.145.128.157 port 54628 ssh2
...
2020-07-04 06:30:46
137.74.166.77 attackbotsspam
2020-07-03T16:35:03.6064371495-001 sshd[24840]: Failed password for invalid user transfer from 137.74.166.77 port 57350 ssh2
2020-07-03T16:38:05.6811671495-001 sshd[24970]: Invalid user xxx from 137.74.166.77 port 54266
2020-07-03T16:38:05.6887861495-001 sshd[24970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.ip-137-74-166.eu
2020-07-03T16:38:05.6811671495-001 sshd[24970]: Invalid user xxx from 137.74.166.77 port 54266
2020-07-03T16:38:07.9638071495-001 sshd[24970]: Failed password for invalid user xxx from 137.74.166.77 port 54266 ssh2
2020-07-03T16:41:14.3753601495-001 sshd[25100]: Invalid user eth from 137.74.166.77 port 51182
...
2020-07-04 07:00:07
66.23.193.221 attack
Jul  3 20:49:52 onepixel sshd[745466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.23.193.221 
Jul  3 20:49:52 onepixel sshd[745466]: Invalid user rebeca from 66.23.193.221 port 57384
Jul  3 20:49:54 onepixel sshd[745466]: Failed password for invalid user rebeca from 66.23.193.221 port 57384 ssh2
Jul  3 20:53:26 onepixel sshd[747263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.23.193.221  user=root
Jul  3 20:53:27 onepixel sshd[747263]: Failed password for root from 66.23.193.221 port 33782 ssh2
2020-07-04 06:47:57
137.74.132.171 attackbots
$f2bV_matches
2020-07-04 07:06:38
193.228.108.122 attackspam
Invalid user students from 193.228.108.122 port 43012
2020-07-04 06:54:35
137.74.172.1 attackspam
$f2bV_matches
2020-07-04 06:58:23
64.225.58.236 attackspam
Jul  4 03:20:43 gw1 sshd[18900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.58.236
Jul  4 03:20:45 gw1 sshd[18900]: Failed password for invalid user sftp from 64.225.58.236 port 54528 ssh2
...
2020-07-04 06:29:20
37.129.130.82 attackspambots
Unauthorized connection attempt from IP address 37.129.130.82 on Port 445(SMB)
2020-07-04 06:45:07
141.98.81.208 attack
Jul  4 05:29:08 webhost01 sshd[6127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.208
Jul  4 05:29:09 webhost01 sshd[6127]: Failed password for invalid user Administrator from 141.98.81.208 port 15125 ssh2
...
2020-07-04 06:33:28

Recently Reported IPs

53.21.122.128 185.36.240.147 203.5.90.128 228.143.253.20
117.167.97.132 99.126.147.150 52.193.252.205 131.99.9.59
192.227.195.145 19.80.114.103 129.26.226.74 221.250.138.2
6.188.62.139 46.198.74.213 236.242.157.101 87.213.30.211
74.144.149.109 21.234.246.18 98.10.147.73 24.90.102.89