Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.196.45.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.196.45.129.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:00:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
129.45.196.104.in-addr.arpa domain name pointer 129.45.196.104.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.45.196.104.in-addr.arpa	name = 129.45.196.104.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.188.206.199 attack
Oct  9 14:28:43 mail.srvfarm.net postfix/smtpd[355545]: warning: unknown[5.188.206.199]: SASL PLAIN authentication failed: 
Oct  9 14:28:43 mail.srvfarm.net postfix/smtpd[355545]: lost connection after AUTH from unknown[5.188.206.199]
Oct  9 14:28:49 mail.srvfarm.net postfix/smtpd[355547]: lost connection after AUTH from unknown[5.188.206.199]
Oct  9 14:28:56 mail.srvfarm.net postfix/smtpd[355544]: lost connection after AUTH from unknown[5.188.206.199]
Oct  9 14:29:00 mail.srvfarm.net postfix/smtpd[355547]: warning: unknown[5.188.206.199]: SASL PLAIN authentication failed:
2020-10-09 21:11:48
196.247.5.50 attack
Web form spam
2020-10-09 21:14:00
166.252.236.146 attack
Oct  8 22:48:19 ns382633 sshd\[18815\]: Invalid user admin from 166.252.236.146 port 6127
Oct  8 22:48:19 ns382633 sshd\[18815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.252.236.146
Oct  8 22:48:21 ns382633 sshd\[18815\]: Failed password for invalid user admin from 166.252.236.146 port 6127 ssh2
Oct  8 22:48:24 ns382633 sshd\[18818\]: Invalid user admin from 166.252.236.146 port 50036
Oct  8 22:48:25 ns382633 sshd\[18818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.252.236.146
2020-10-09 21:02:52
222.186.42.137 attackbots
Oct  9 10:12:20 vm1 sshd[31734]: Failed password for root from 222.186.42.137 port 25918 ssh2
Oct  9 15:13:54 vm1 sshd[4582]: Failed password for root from 222.186.42.137 port 21529 ssh2
...
2020-10-09 21:15:15
193.70.21.159 attackbotsspam
 UDP 193.70.21.159:5078 -> port 5060, len 439
2020-10-09 20:52:31
188.0.175.45 attack
1602190102 - 10/08/2020 22:48:22 Host: 188.0.175.45/188.0.175.45 Port: 445 TCP Blocked
...
2020-10-09 21:06:31
61.177.172.104 attack
[MK-VM6] SSH login failed
2020-10-09 20:51:48
45.142.120.58 attackbots
2020-10-09 04:39:25 dovecot_login authenticator failed for \(localhost\) \[45.142.120.58\]: 535 Incorrect authentication data \(set_id=rqd@no-server.de\)
2020-10-09 04:39:36 dovecot_login authenticator failed for \(localhost\) \[45.142.120.58\]: 535 Incorrect authentication data \(set_id=gid@no-server.de\)
2020-10-09 04:39:38 dovecot_login authenticator failed for \(localhost\) \[45.142.120.58\]: 535 Incorrect authentication data \(set_id=blacklist@no-server.de\)
2020-10-09 04:39:51 dovecot_login authenticator failed for \(localhost\) \[45.142.120.58\]: 535 Incorrect authentication data \(set_id=gabvirtual@no-server.de\)
2020-10-09 04:39:57 dovecot_login authenticator failed for \(localhost\) \[45.142.120.58\]: 535 Incorrect authentication data \(set_id=gofuckyourself@no-server.de\)
2020-10-09 04:39:57 dovecot_login authenticator failed for \(localhost\) \[45.142.120.58\]: 535 Incorrect authentication data \(set_id=matsuno@no-server.de\)
2020-10-09 04:40:07 dovecot_login authenticator 
...
2020-10-09 21:16:21
182.61.49.107 attackspam
2020-10-09T06:54:18.3127591495-001 sshd[62343]: Failed password for root from 182.61.49.107 port 43788 ssh2
2020-10-09T06:57:53.5004411495-001 sshd[62545]: Invalid user aptproxy from 182.61.49.107 port 38372
2020-10-09T06:57:53.5040631495-001 sshd[62545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.107
2020-10-09T06:57:53.5004411495-001 sshd[62545]: Invalid user aptproxy from 182.61.49.107 port 38372
2020-10-09T06:57:55.1209361495-001 sshd[62545]: Failed password for invalid user aptproxy from 182.61.49.107 port 38372 ssh2
2020-10-09T07:01:35.7119141495-001 sshd[62791]: Invalid user manager1 from 182.61.49.107 port 32946
...
2020-10-09 20:36:15
200.108.143.6 attackspam
Oct  9 06:40:51 inter-technics sshd[14664]: Invalid user bestcoach from 200.108.143.6 port 39044
Oct  9 06:40:51 inter-technics sshd[14664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
Oct  9 06:40:51 inter-technics sshd[14664]: Invalid user bestcoach from 200.108.143.6 port 39044
Oct  9 06:40:52 inter-technics sshd[14664]: Failed password for invalid user bestcoach from 200.108.143.6 port 39044 ssh2
Oct  9 06:45:15 inter-technics sshd[18258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6  user=root
Oct  9 06:45:17 inter-technics sshd[18258]: Failed password for root from 200.108.143.6 port 45036 ssh2
...
2020-10-09 21:12:39
183.136.225.45 attackspambots
Port scan detected
2020-10-09 20:56:11
211.87.178.161 attackspam
Oct  9 10:39:06 cho sshd[286083]: Invalid user test from 211.87.178.161 port 40740
Oct  9 10:39:06 cho sshd[286083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.87.178.161 
Oct  9 10:39:06 cho sshd[286083]: Invalid user test from 211.87.178.161 port 40740
Oct  9 10:39:08 cho sshd[286083]: Failed password for invalid user test from 211.87.178.161 port 40740 ssh2
Oct  9 10:43:31 cho sshd[286356]: Invalid user shutdown from 211.87.178.161 port 45358
...
2020-10-09 20:38:57
135.181.100.170 attackspambots
(sshd) Failed SSH login from 135.181.100.170 (FI/Finland/Uusimaa/Tuusula/static.170.100.181.135.clients.your-server.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  9 06:57:18 atlas sshd[557]: Invalid user teamspeak from 135.181.100.170 port 37112
Oct  9 06:57:20 atlas sshd[557]: Failed password for invalid user teamspeak from 135.181.100.170 port 37112 ssh2
Oct  9 07:05:17 atlas sshd[2689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.181.100.170  user=root
Oct  9 07:05:19 atlas sshd[2689]: Failed password for root from 135.181.100.170 port 39814 ssh2
Oct  9 07:09:37 atlas sshd[3745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.181.100.170  user=root
2020-10-09 20:47:51
201.217.159.155 attackspam
Oct  9 13:12:37 mout sshd[31598]: Invalid user sync1 from 201.217.159.155 port 34412
2020-10-09 20:43:06
185.25.206.99 attackbots
Oct  9 11:56:04 h2779839 sshd[12517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.25.206.99  user=root
Oct  9 11:56:06 h2779839 sshd[12517]: Failed password for root from 185.25.206.99 port 42628 ssh2
Oct  9 11:58:42 h2779839 sshd[12543]: Invalid user tester from 185.25.206.99 port 60582
Oct  9 11:58:42 h2779839 sshd[12543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.25.206.99
Oct  9 11:58:42 h2779839 sshd[12543]: Invalid user tester from 185.25.206.99 port 60582
Oct  9 11:58:44 h2779839 sshd[12543]: Failed password for invalid user tester from 185.25.206.99 port 60582 ssh2
Oct  9 12:01:17 h2779839 sshd[12565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.25.206.99  user=root
Oct  9 12:01:19 h2779839 sshd[12565]: Failed password for root from 185.25.206.99 port 52442 ssh2
Oct  9 12:04:05 h2779839 sshd[12629]: pam_unix(sshd:auth): authentication
...
2020-10-09 20:39:30

Recently Reported IPs

104.196.47.138 104.196.47.177 104.196.47.36 104.196.41.86
104.196.47.192 104.196.48.132 104.196.49.15 104.196.49.51
104.196.5.114 104.196.52.56 104.196.54.206 104.196.56.232
104.196.56.44 104.21.66.180 104.196.55.129 104.196.59.135
104.196.6.35 104.196.59.11 104.196.63.64 104.196.62.211