Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.158.45.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.158.45.31.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 00:46:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
31.45.158.104.in-addr.arpa domain name pointer 31.45.158.104.in-addr.arpa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
31.45.158.104.in-addr.arpa	name = 31.45.158.104.in-addr.arpa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.246.175.156 attack
Aug  7 03:54:13 server sshd\[173191\]: Invalid user heim from 190.246.175.156
Aug  7 03:54:13 server sshd\[173191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.175.156
Aug  7 03:54:16 server sshd\[173191\]: Failed password for invalid user heim from 190.246.175.156 port 25387 ssh2
...
2019-08-07 16:35:38
107.170.201.213 attackspam
firewall-block, port(s): 27375/tcp
2019-08-07 16:45:24
111.198.29.223 attack
Automatic report - Banned IP Access
2019-08-07 17:12:06
198.108.66.64 attackbots
Port scan and direct access per IP instead of hostname
2019-08-07 16:22:17
103.114.107.128 attack
>30 unauthorized SSH connections
2019-08-07 16:13:39
103.114.107.133 attack
>50 unauthorized SSH connections
2019-08-07 16:26:15
115.133.52.94 attackbots
$f2bV_matches
2019-08-07 16:53:43
139.99.144.191 attack
Aug  7 10:51:04 nextcloud sshd\[26311\]: Invalid user hau from 139.99.144.191
Aug  7 10:51:04 nextcloud sshd\[26311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.144.191
Aug  7 10:51:06 nextcloud sshd\[26311\]: Failed password for invalid user hau from 139.99.144.191 port 33432 ssh2
...
2019-08-07 17:10:16
191.187.203.182 attackbotsspam
Aug  7 11:04:52 ArkNodeAT sshd\[19074\]: Invalid user coupon from 191.187.203.182
Aug  7 11:04:52 ArkNodeAT sshd\[19074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.187.203.182
Aug  7 11:04:54 ArkNodeAT sshd\[19074\]: Failed password for invalid user coupon from 191.187.203.182 port 35554 ssh2
2019-08-07 17:08:40
106.51.75.9 attack
Unauthorized connection attempt from IP address 106.51.75.9 on Port 445(SMB)
2019-08-07 16:19:46
211.151.95.139 attackbots
Automatic report - Banned IP Access
2019-08-07 17:08:07
54.153.53.216 attackbotsspam
port scan and connect, tcp 119 (nntp)
2019-08-07 16:47:05
103.104.17.139 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-08-07 17:03:12
106.12.128.24 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-08-07 16:49:22
112.85.42.194 attackspambots
Aug  7 02:58:47 debian sshd[16793]: Unable to negotiate with 112.85.42.194 port 10082: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug  7 03:01:45 debian sshd[16963]: Unable to negotiate with 112.85.42.194 port 57200: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2019-08-07 17:11:37

Recently Reported IPs

104.157.73.168 104.159.169.27 104.158.248.205 104.158.82.161
104.159.166.170 104.158.165.150 103.206.195.20 104.159.197.202
104.159.229.50 104.159.209.150 104.16.230.247 104.16.24.62
104.16.216.64 104.16.21.110 104.16.231.247 103.206.201.100
104.16.25.62 104.16.38.78 104.16.20.110 104.16.47.75