Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.252.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.252.45.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052502 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 26 06:08:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 45.252.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.252.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.182 attackbots
Oct 23 12:21:56 ip-172-31-1-72 sshd\[10405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Oct 23 12:21:58 ip-172-31-1-72 sshd\[10405\]: Failed password for root from 222.186.175.182 port 60696 ssh2
Oct 23 12:22:28 ip-172-31-1-72 sshd\[10421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Oct 23 12:22:31 ip-172-31-1-72 sshd\[10421\]: Failed password for root from 222.186.175.182 port 21200 ssh2
Oct 23 12:23:05 ip-172-31-1-72 sshd\[10423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-10-23 20:43:56
142.93.44.83 attack
WordPress login Brute force / Web App Attack on client site.
2019-10-23 20:17:40
220.149.241.75 attackspambots
Oct 23 02:03:37 sachi sshd\[26049\]: Invalid user user6 from 220.149.241.75
Oct 23 02:03:38 sachi sshd\[26049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.149.241.75
Oct 23 02:03:39 sachi sshd\[26049\]: Failed password for invalid user user6 from 220.149.241.75 port 38192 ssh2
Oct 23 02:08:19 sachi sshd\[26389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.149.241.75  user=root
Oct 23 02:08:20 sachi sshd\[26389\]: Failed password for root from 220.149.241.75 port 52706 ssh2
2019-10-23 20:31:45
183.89.43.14 attack
Port Scan
2019-10-23 20:32:20
109.104.105.115 attack
Portscan or hack attempt detected by psad/fwsnort
2019-10-23 20:41:38
160.20.109.63 attackbotsspam
X-Barracuda-Envelope-From: appeal@gravitystem.best
X-Barracuda-Effective-Source-IP: UNKNOWN[160.20.109.63]
X-Barracuda-Apparent-Source-IP: 160.20.109.63
From: " Troy Harrison" 
Date: Wed, 23 Oct 2019 06:26:11 -0500
2019-10-23 20:15:03
159.203.201.239 attack
" "
2019-10-23 20:45:20
146.88.240.2 attackspambots
Message meets Alert condition
date=2019-10-23 time=03:04:57 devname=FG200E4Q16901016 devid=FG200E4Q16901016 logid=0101037124 type=event subtype=vpn level=error vd=root logdesc="IPsec phase 1 error" msg="IPsec phase 1 error" action=negotiate remip=146.88.240.2 locip=107.178.11.178 remport=60660 locport=500 outintf="wan1" cookies="a22b7032da7d4420/0000000000000000" user="N/A" group="N/A" xauthuser="N/A" xauthgroup="N/A" assignip=N/A vpntunnel="N/A" status=negotiate_error reason="peer SA proposal not match local policy" peer_notif="NOT-APPLICABLE"
2019-10-23 20:41:11
125.213.150.6 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2019-10-23 20:42:15
185.42.195.86 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 20:13:14
118.89.62.112 attackspam
2019-10-23T12:22:03.631046abusebot-5.cloudsearch.cf sshd\[4198\]: Invalid user oracle from 118.89.62.112 port 44346
2019-10-23 20:40:11
150.109.52.25 attackspam
Oct 23 14:19:45 legacy sshd[30513]: Failed password for root from 150.109.52.25 port 47042 ssh2
Oct 23 14:24:04 legacy sshd[30640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.52.25
Oct 23 14:24:06 legacy sshd[30640]: Failed password for invalid user ubnt from 150.109.52.25 port 57926 ssh2
...
2019-10-23 20:35:52
49.234.51.242 attackspam
Automatic report - Banned IP Access
2019-10-23 20:50:01
137.74.169.241 attackbots
REQUESTED PAGE: /imaspammer/
2019-10-23 20:16:45
122.117.180.147 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 20:52:25

Recently Reported IPs

104.16.248.185 104.16.29.235 104.16.29.57 104.16.50.54
104.16.88.8 104.16.89.8 104.160.174.85 104.160.174.86
104.160.174.87 104.160.174.88 104.160.4.206 104.160.72.244
104.160.74.3 104.161.21.135 104.161.23.18 104.164.153.240
104.164.167.66 104.164.228.68 104.165.108.176 104.165.108.177