Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.227.145.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.227.145.1.			IN	A

;; AUTHORITY SECTION:
.			298	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 06:00:14 CST 2022
;; MSG SIZE  rcvd: 106
Host info
1.145.227.104.in-addr.arpa domain name pointer indo.homeassisthd.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.145.227.104.in-addr.arpa	name = indo.homeassisthd.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.237.175.97 attackspambots
Sep 28 12:50:08 prod4 sshd\[7464\]: Failed password for root from 183.237.175.97 port 22741 ssh2
Sep 28 12:54:24 prod4 sshd\[9112\]: Failed password for root from 183.237.175.97 port 55796 ssh2
Sep 28 12:58:48 prod4 sshd\[11115\]: Invalid user b from 183.237.175.97
...
2020-09-29 00:24:04
165.227.72.166 attackspambots
Invalid user mauro from 165.227.72.166 port 54322
2020-09-29 00:29:29
193.201.212.55 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-29 00:01:05
165.84.180.47 attackspambots
Sep 28 00:45:02 *** sshd[20455]: Invalid user xiaoming from 165.84.180.47
2020-09-29 00:32:36
64.227.106.112 attackbotsspam
trying to access non-authorized port
2020-09-28 23:59:09
103.100.208.254 attackbotsspam
Time:     Sun Sep 27 00:03:49 2020 +0000
IP:       103.100.208.254 (HK/Hong Kong/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 00:00:19 activeserver sshd[29003]: Invalid user cssserver from 103.100.208.254 port 33274
Sep 27 00:00:21 activeserver sshd[29003]: Failed password for invalid user cssserver from 103.100.208.254 port 33274 ssh2
Sep 27 00:02:01 activeserver sshd[30873]: Invalid user administrator from 103.100.208.254 port 43692
Sep 27 00:02:03 activeserver sshd[30873]: Failed password for invalid user administrator from 103.100.208.254 port 43692 ssh2
Sep 27 00:03:43 activeserver sshd[402]: Invalid user teste1 from 103.100.208.254 port 54108
2020-09-29 00:23:06
139.59.7.225 attack
$f2bV_matches
2020-09-29 00:04:04
39.109.117.54 attackbots
2020-09-27T20:37:06Z - RDP login failed multiple times. (39.109.117.54)
2020-09-29 00:16:38
180.183.250.13 attack
445/tcp 445/tcp 445/tcp...
[2020-08-15/09-27]4pkt,1pt.(tcp)
2020-09-29 00:01:39
209.141.50.85 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-29 00:00:40
104.140.188.10 attackbotsspam
23/tcp 5432/tcp 5060/tcp...
[2020-07-29/09-27]47pkt,8pt.(tcp),1pt.(udp)
2020-09-29 00:18:52
189.162.99.17 attackspam
SSH Bruteforce Attempt on Honeypot
2020-09-29 00:16:53
68.183.234.193 attack
Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2020-09-28T15:45:00Z and 2020-09-28T15:47:13Z
2020-09-28 23:58:48
54.198.217.192 attackspam
Port Scan: TCP/81
2020-09-29 00:22:15
46.101.248.180 attack
Invalid user user1 from 46.101.248.180 port 59312
2020-09-29 00:28:57

Recently Reported IPs

104.227.133.64 104.227.145.144 104.227.145.73 104.227.145.85
104.227.152.143 104.227.152.187 104.227.152.238 104.227.152.45
217.55.43.221 104.227.206.199 104.227.206.206 104.227.206.213
104.227.206.46 104.227.206.8 77.61.28.238 104.227.208.139
104.227.209.208 104.227.209.214 104.227.209.76 104.227.210.88