Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Piscataway

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.243.35.113 attack
*Port Scan* detected from 104.243.35.113 (US/United States/New Jersey/Newark/104-243-35-113.cinfuserver.com). 4 hits in the last 155 seconds
2020-06-01 12:19:06
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       104.243.32.0 - 104.243.47.255
CIDR:           104.243.32.0/20
NetName:        RELIABLESITE-NETBLOCK
NetHandle:      NET-104-243-32-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   ReliableSite.Net LLC (RL-323)
RegDate:        2014-11-13
Updated:        2023-08-15
Comment:        geofeed: https://www.reliablesite.net/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/104.243.32.0



OrgName:        ReliableSite.Net LLC
OrgId:          RL-323
Address:        2115 NW 22nd St
City:           Miami
StateProv:      FL
PostalCode:     33142
Country:        US
RegDate:        2015-09-09
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/RL-323


OrgAbuseHandle: ABUSE3593-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-866-932-0001 
OrgAbuseEmail:  abuse@reliablesite.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3593-ARIN

OrgTechHandle: SUPPO1295-ARIN
OrgTechName:   Support Department
OrgTechPhone:  +1-866-932-0001 
OrgTechEmail:  support@reliablesite.net
OrgTechRef:    https://rdap.arin.net/registry/entity/SUPPO1295-ARIN

RAbuseHandle: ABUSE6422-ARIN
RAbuseName:   Abuse, Radic 
RAbusePhone:  +1-866-932-0001 
RAbuseEmail:  abuse@reliablesite.net
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE6422-ARIN

RTechHandle: DAVYD-ARIN
RTechName:   Davydov, Radic 
RTechPhone:  +1-866-932-0001 
RTechEmail:  rdavydov@reliablesite.net
RTechRef:    https://rdap.arin.net/registry/entity/DAVYD-ARIN

# end


# start

NetRange:       104.243.35.40 - 104.243.35.47
CIDR:           104.243.35.40/29
NetName:        NET-104-243-35-40-29
NetHandle:      NET-104-243-35-40-1
Parent:         RELIABLESITE-NETBLOCK (NET-104-243-32-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       OBDE Group (C06093902)
RegDate:        2016-04-15
Updated:        2016-04-15
Ref:            https://rdap.arin.net/registry/ip/104.243.35.40


CustName:       OBDE Group
Address:        OBDE Group
City:           Redmon
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        2016-04-15
Updated:        2016-04-15
Ref:            https://rdap.arin.net/registry/entity/C06093902

OrgAbuseHandle: ABUSE3593-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-866-932-0001 
OrgAbuseEmail:  abuse@reliablesite.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3593-ARIN

OrgTechHandle: SUPPO1295-ARIN
OrgTechName:   Support Department
OrgTechPhone:  +1-866-932-0001 
OrgTechEmail:  support@reliablesite.net
OrgTechRef:    https://rdap.arin.net/registry/entity/SUPPO1295-ARIN

RAbuseHandle: ABUSE6422-ARIN
RAbuseName:   Abuse, Radic 
RAbusePhone:  +1-866-932-0001 
RAbuseEmail:  abuse@reliablesite.net
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE6422-ARIN

RTechHandle: DAVYD-ARIN
RTechName:   Davydov, Radic 
RTechPhone:  +1-866-932-0001 
RTechEmail:  rdavydov@reliablesite.net
RTechRef:    https://rdap.arin.net/registry/entity/DAVYD-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.243.35.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.243.35.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042500 1800 900 604800 86400

;; Query time: 303 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 19:30:03 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 45.35.243.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.35.243.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.29.53.107 attackbotsspam
Invalid user rik from 119.29.53.107 port 42610
2020-07-02 03:33:49
209.17.96.178 attack
 UDP 209.17.96.178:57452 -> port 137, len 78
2020-07-02 04:15:43
122.116.92.179 attack
Unauthorized connection attempt from IP address 122.116.92.179 on Port 445(SMB)
2020-07-02 04:12:35
113.172.208.195 attackspam
Email rejected due to spam filtering
2020-07-02 04:04:45
187.138.171.162 attack
Unauthorized connection attempt detected from IP address 187.138.171.162 to port 445 [T]
2020-07-02 03:28:04
86.120.194.93 attack
Unauthorised access (Apr  9) SRC=86.120.194.93 LEN=40 TTL=245 ID=44045 DF TCP DPT=23 WINDOW=14600 SYN
2020-07-02 04:01:38
159.65.11.115 attack
SSH Invalid Login
2020-07-02 03:21:22
51.178.78.154 attackspambots
Scanned 333 unique addresses for 105 unique TCP ports in 24 hours
2020-07-02 03:35:14
129.28.163.90 attackbots
Jun 30 17:50:33 home sshd[20694]: Failed password for root from 129.28.163.90 port 52824 ssh2
Jun 30 17:53:22 home sshd[20927]: Failed password for root from 129.28.163.90 port 54184 ssh2
...
2020-07-02 03:41:08
51.91.250.197 attackbotsspam
Icarus honeypot on github
2020-07-02 03:38:21
172.105.105.87 attackbots
2020/06/30 02:31:59 [crit] 19166#19166: *12899 SSL_do_handshake() failed (SSL: error:14094085:SSL routines:ssl3_read_bytes:ccs received early) while SSL handshaking, client: 172.105.105.87, server: 0.0.0.0:443
2020-07-02 03:20:19
151.229.240.181 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-02 03:53:40
106.12.69.90 attack
B: Abusive ssh attack
2020-07-02 03:50:47
5.248.164.76 attack
"US-ASCII Malformed Encoding XSS Filter - Attack Detected - Matched Data: \xbc\xd1\x8b\xd0\xb5 \xd0\xbf\xd0\xbe found within ARGS:comentario: \xd0\x9f\xd1\x80\xd0\xb8\xd0\xb2\xd0\xb5\xd1\x82\xd1\x81\xd1\x82\xd0\xb2\xd1\x83\xd1\x8e \xd0\xb2\xd0\xb0\xd1\x81 \x0d\x0a\xd0\x97\xd0\xbd\xd0\xb0\xd0\xba\xd0\xbe\xd0\xbc\xd1\x8b\xd0\xb5 \xd0\xbf\xd0\xbe\xd0\xba\xd1\x83\xd0\xbf\xd0\xb0\xd0\xbb\xd0\xb8 \x0d\x0a\xd0\x92\xd1\x8b\xd1\x81\xd0\xbe\xd1\x87\xd0\xb0\xd0\xb9\xd1\x88\xd0\xb5\xd0\xb5 \xd0\xba\xd0\xb0\xd1\x87\xd0\xb5\xd1\x81\xd1\x82\xd0\xb2\xd0\xbe \xd0\xbb\xd0\xb5\xd0\..."
2020-07-02 04:00:59
200.24.198.190 attackspambots
Unauthorized connection attempt detected from IP address 200.24.198.190 to port 445
2020-07-02 03:26:19

Recently Reported IPs

112.111.200.61 91.196.152.67 2606:4700:10::6814:6096 2606:4700:10::6814:4628
68.183.216.224 68.183.223.205 91.196.152.156 20.65.194.105
161.35.70.8 27.115.124.159 162.63.216.193 26.134.42.148
72.255.32.50 45.142.154.103 192.175.111.232 123.14.90.33
2606:4700:10::6814:8913 8.36.72.235 123.51.239.160 148.135.115.106