Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.180.98.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.180.98.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:35:55 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 245.98.180.104.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 104.180.98.245.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
31.173.26.213 attack
1585576659 - 03/30/2020 15:57:39 Host: 31.173.26.213/31.173.26.213 Port: 445 TCP Blocked
2020-03-30 22:22:48
23.129.64.209 attackbots
Brute force SMTP login attempted.
...
2020-03-30 23:01:10
23.225.147.66 attackbots
Brute force SMTP login attempted.
...
2020-03-30 22:50:43
85.97.205.75 attackbots
Automatic report - Port Scan Attack
2020-03-30 22:22:21
23.233.63.198 attack
Brute force SMTP login attempted.
...
2020-03-30 22:44:22
72.1.196.184 attack
port scan and connect, tcp 23 (telnet)
2020-03-30 22:56:36
189.124.4.48 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-03-30 22:51:38
23.233.191.214 attackbots
Brute force SMTP login attempted.
...
2020-03-30 22:45:36
138.94.183.75 attackspambots
RDP Brute Force
2020-03-30 22:45:03
222.92.139.158 attackbots
Automatic report - Banned IP Access
2020-03-30 22:30:56
165.22.65.134 attackbotsspam
Mar 30 16:29:02 ns382633 sshd\[19383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.65.134  user=root
Mar 30 16:29:04 ns382633 sshd\[19383\]: Failed password for root from 165.22.65.134 port 34666 ssh2
Mar 30 16:38:01 ns382633 sshd\[21663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.65.134  user=root
Mar 30 16:38:03 ns382633 sshd\[21663\]: Failed password for root from 165.22.65.134 port 56424 ssh2
Mar 30 16:41:48 ns382633 sshd\[22790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.65.134  user=root
2020-03-30 22:49:09
23.135.32.128 attackbotsspam
Brute force SMTP login attempted.
...
2020-03-30 22:53:06
23.236.76.5 attackspam
Brute force SMTP login attempted.
...
2020-03-30 22:40:55
106.53.19.186 attack
Mar 30 16:26:13 host01 sshd[6647]: Failed password for root from 106.53.19.186 port 40436 ssh2
Mar 30 16:28:55 host01 sshd[7393]: Failed password for root from 106.53.19.186 port 53741 ssh2
...
2020-03-30 22:37:28
87.126.223.9 attackspambots
Automatic report - Banned IP Access
2020-03-30 22:50:29

Recently Reported IPs

69.221.167.75 124.112.190.29 163.94.65.243 174.171.153.125
164.240.244.100 74.89.75.17 207.149.119.51 236.180.80.167
23.140.92.27 145.163.51.64 52.101.1.19 228.123.13.76
97.8.187.230 216.254.83.8 178.25.134.30 91.227.64.1
153.2.145.242 206.112.77.129 159.213.244.196 13.244.72.85