Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.216.45.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.216.45.209.			IN	A

;; AUTHORITY SECTION:
.			178	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030300 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 01:41:15 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 209.45.216.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 209.45.216.104.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
139.199.122.96 attack
Invalid user rkassim from 139.199.122.96 port 59816
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.122.96
Failed password for invalid user rkassim from 139.199.122.96 port 59816 ssh2
Invalid user hacker from 139.199.122.96 port 29211
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.122.96
2019-07-02 17:16:30
41.38.196.63 attack
23/tcp
[2019-07-02]1pkt
2019-07-02 18:05:42
167.114.24.186 attackspambots
20000/tcp 81/tcp 389/tcp...
[2019-05-02/07-02]25pkt,12pt.(tcp)
2019-07-02 17:21:18
115.110.204.197 attackspambots
Jul  2 11:39:13 MK-Soft-Root2 sshd\[2762\]: Invalid user postgres from 115.110.204.197 port 43120
Jul  2 11:39:13 MK-Soft-Root2 sshd\[2762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.110.204.197
Jul  2 11:39:14 MK-Soft-Root2 sshd\[2762\]: Failed password for invalid user postgres from 115.110.204.197 port 43120 ssh2
...
2019-07-02 17:53:23
73.15.91.251 attackbots
Jul  2 10:56:15 vps647732 sshd[18743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.15.91.251
Jul  2 10:56:17 vps647732 sshd[18743]: Failed password for invalid user guang from 73.15.91.251 port 47494 ssh2
...
2019-07-02 17:17:36
14.169.210.121 attackbots
Jul  2 06:47:56 srv-4 sshd\[16114\]: Invalid user admin from 14.169.210.121
Jul  2 06:47:56 srv-4 sshd\[16114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.169.210.121
Jul  2 06:47:59 srv-4 sshd\[16114\]: Failed password for invalid user admin from 14.169.210.121 port 41496 ssh2
...
2019-07-02 17:53:45
51.254.49.110 attack
993/tcp 8888/tcp 9200/tcp...
[2019-05-02/07-02]24pkt,12pt.(tcp)
2019-07-02 17:27:26
146.185.25.169 attackspam
40443/tcp 65535/tcp 2082/tcp...
[2019-05-05/07-02]28pkt,12pt.(tcp),2pt.(udp)
2019-07-02 17:42:37
175.138.54.68 attackbots
Jul  2 11:36:46 icinga sshd[25489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.54.68
Jul  2 11:36:48 icinga sshd[25489]: Failed password for invalid user squ1sh from 175.138.54.68 port 51202 ssh2
...
2019-07-02 17:47:32
109.50.193.176 attackspambots
SSH Bruteforce Attack
2019-07-02 17:56:13
37.49.227.49 attackbotsspam
Brute forcing IMAP accounts
2019-07-02 17:32:15
187.190.154.70 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 02:21:21,402 INFO [amun_request_handler] PortScan Detected on Port: 445 (187.190.154.70)
2019-07-02 17:15:40
146.185.25.165 attackspambots
40443/tcp 7002/tcp 3389/tcp...
[2019-05-02/07-02]30pkt,13pt.(tcp),2pt.(udp)
2019-07-02 17:40:50
41.47.169.126 attack
445/tcp
[2019-07-02]1pkt
2019-07-02 18:01:23
52.36.109.153 attack
blacklist username leticia
Invalid user leticia from 52.36.109.153 port 43168
2019-07-02 17:33:28

Recently Reported IPs

104.216.45.207 177.32.0.221 104.216.45.211 104.216.45.212
104.216.45.213 104.216.45.217 104.216.54.196 104.216.8.229
104.216.88.80 104.216.88.81 104.216.88.82 104.216.88.83
104.216.88.84 104.216.88.85 104.216.88.86 104.22.0.203
104.22.0.229 104.22.0.93 104.22.1.203 104.22.1.229