Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.196.45.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.196.45.9.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 136 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:00:19 CST 2022
;; MSG SIZE  rcvd: 105
Host info
9.45.196.104.in-addr.arpa domain name pointer 9.45.196.104.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.45.196.104.in-addr.arpa	name = 9.45.196.104.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.130.136.120 attack
$f2bV_matches
2019-07-24 10:15:20
177.191.55.245 attackbots
DATE:2019-07-23_22:13:17, IP:177.191.55.245, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-07-24 09:48:56
115.254.63.52 attack
Invalid user applmgr from 115.254.63.52 port 36451
2019-07-24 10:14:14
191.253.98.14 attackbots
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (1011)
2019-07-24 10:08:36
188.165.220.213 attackspambots
Invalid user ca from 188.165.220.213 port 58360
2019-07-24 10:16:17
194.61.24.29 attackbots
194.61.24.29 - - [24/Jul/2019:03:26:22 +0200] "POST /wp-login.php HTTP/1.1" 200 4574 "http://digitalk-iaelyon.fr/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
194.61.24.29 - - [24/Jul/2019:03:26:22 +0200] "POST /wp-login.php HTTP/1.1" 200 4574 "http://digitalk-iaelyon.fr/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
194.61.24.29 - - [24/Jul/2019:03:26:22 +0200] "POST /wp-login.php HTTP/1.1" 200 4574 "http://digitalk-iaelyon.fr/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
194.61.24.29 - - [24/Jul/2019:03:26:22 +0200] "POST /wp-login.php HTTP/1.1" 200 4574 "http://digitalk-iaelyon.fr/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
194.61.24.29 - - [24/Jul/2019:03:26:23 +0200
2019-07-24 09:44:19
222.186.15.217 attack
2019-07-24T01:34:04.230823abusebot-2.cloudsearch.cf sshd\[31578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.217  user=root
2019-07-24 10:00:43
78.100.18.81 attackbotsspam
Jul 24 04:22:07 srv-4 sshd\[25977\]: Invalid user flex from 78.100.18.81
Jul 24 04:22:07 srv-4 sshd\[25977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.100.18.81
Jul 24 04:22:09 srv-4 sshd\[25977\]: Failed password for invalid user flex from 78.100.18.81 port 49556 ssh2
...
2019-07-24 09:56:26
93.104.215.63 attackspam
WordPress brute force
2019-07-24 10:09:38
131.72.216.146 attack
Jul 24 04:03:21 rpi sshd[6625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.72.216.146 
Jul 24 04:03:23 rpi sshd[6625]: Failed password for invalid user oracle from 131.72.216.146 port 55585 ssh2
2019-07-24 10:24:18
106.110.17.60 attack
Automatic report - Port Scan Attack
2019-07-24 10:21:30
128.14.209.234 attack
port scan and connect, tcp 443 (https)
2019-07-24 10:30:49
103.207.2.204 attackspambots
Jul 24 03:39:10 eventyay sshd[32085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.2.204
Jul 24 03:39:12 eventyay sshd[32085]: Failed password for invalid user stats from 103.207.2.204 port 33756 ssh2
Jul 24 03:45:33 eventyay sshd[1201]: Failed password for root from 103.207.2.204 port 49250 ssh2
...
2019-07-24 09:58:11
138.128.111.221 attackbots
(From raymondproberts18@gmail.com) Hi!

There are some issues on your website that needs to be fixed in order for your website to move up in the rankings in Google and the other search engines. Would you be interested in getting a free consultation to learn a little more about how search engine optimization (SEO) can help make your website more profitable? 

I'm a freelancer who provides search engine optimization services, and I'm seeking new clients that have good businesses, but are struggling with their search engine rankings. I'd like to bring more traffic/sales to your site, so please let me know about your preferred contact number and the best time for a call. Talk to you soon! 

Sincerely,
Raymond Roberts
2019-07-24 10:19:10
201.41.148.228 attackbots
Jul 23 22:17:10 MK-Soft-VM5 sshd\[8105\]: Invalid user test from 201.41.148.228 port 57838
Jul 23 22:17:10 MK-Soft-VM5 sshd\[8105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.41.148.228
Jul 23 22:17:11 MK-Soft-VM5 sshd\[8105\]: Failed password for invalid user test from 201.41.148.228 port 57838 ssh2
...
2019-07-24 09:53:54

Recently Reported IPs

104.196.39.146 104.196.47.109 104.21.66.18 104.196.44.166
104.196.47.138 104.196.45.129 104.196.47.177 104.196.47.36
104.196.41.86 104.196.47.192 104.196.48.132 104.196.49.15
104.196.49.51 104.196.5.114 104.196.52.56 104.196.54.206
104.196.56.232 104.196.56.44 104.21.66.180 104.196.55.129