Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: Amanah Tech Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Malicious Traffic/Form Submission
2020-05-20 01:19:18
attack
(From agnes.donohue@gmail.com) Are you interested in post your business on 1000's of Advertising sites every month? One tiny investment every month will get you virtually unlimited traffic to your site forever!Get more info by emailing: ernest7867bro@gmail.com
2019-07-18 06:50:46
Comments on same subnet:
IP Type Details Datetime
104.245.145.21 attackspambots
2020-08-14 22:58:21
104.245.145.24 attack
2020-08-14 22:58:07
104.245.145.36 attackbots
2020-08-14 22:57:34
104.245.145.41 attackspam
(From christen.crowe@gmail.com) No cost advertising for your website here: http://www.free-ad-submission.xyz
2020-05-24 16:11:03
104.245.145.40 attackbots
(From jina.piscitelli@gmail.com) Greetings, I was just taking a look at your website and filled out your contact form. The feedback page on your site sends you these messages via email which is why you're reading my message at this moment right? That's the most important achievement with any type of online ad, getting people to actually READ your message and this is exactly what you're doing now! If you have an advertisement you would like to blast out to thousands of websites via their contact forms in the U.S. or anywhere in the world send me a quick note now, I can even focus on your required niches and my pricing is very reasonable. Shoot me an email here: Phungcorsi@gmail.com
2020-05-24 15:24:33
104.245.145.7 attack
Automatic report - Banned IP Access
2020-05-24 07:26:20
104.245.145.58 attackbots
Contact form spam
2020-05-23 22:24:16
104.245.145.122 attackspam
(From pitcher.theresa@gmail.com) Interested in the latest fitness , wellness, nutrition trends?

Check out my blog here: https://bit.ly/www-fitnessismystatussymbol-com

And my Instagram page @ziptofitness
2020-05-19 23:52:38
104.245.145.21 attackspambots
(From nussbaum.velma@gmail.com) Groundbreaking new way to advertise your website for Nothing! See here: http://bit.ly/submityourfreeads
2020-05-16 14:55:55
104.245.145.37 attack
(From herlitz.samira@gmail.com) Stem cell therapy has proven itself to be one of the most effective treatments for COPD (Chronic Obstructive Pulmonary Disorder). IMC is the leader in stem cell therapies in Mexico. For more information on how we can treat COPD please visit:
https://bit.ly/copd-integramedicalcenter
2020-05-14 16:37:14
104.245.145.38 attack
Malicious Traffic/Form Submission
2020-05-11 14:29:54
104.245.145.39 attackbots
Spammer
2020-04-11 05:49:45
104.245.145.5 attack
(From marx.stacy@gmail.com) Greetings, I was just visiting your website and filled out your "contact us" form. The contact page on your site sends you messages like this to your email account which is why you are reading my message at this moment right? That's the most important achievement with any type of advertising, making people actually READ your advertisement and that's exactly what I just accomplished with you! If you have an advertisement you would like to blast out to tons of websites via their contact forms in the US or to any country worldwide send me a quick note now, I can even focus on specific niches and my charges are very affordable. Reply here: trinitybeumer@gmail.com
2020-04-08 18:18:02
104.245.145.124 attack
(From samantha.barden@yahoo.com) Are You interested in an advertising service that charges less than $50 every month and sends hundreds of people who are ready to buy directly to your website? Check out: http://www.trafficmasters.xyz
2020-04-06 15:06:05
104.245.145.9 attackspambots
(From stacy.neville@yahoo.com) Looking to lose weight super fast and without any major diet or exercising? You're gonna love this: http://bit.ly/fixbellyfateasy
2020-04-04 17:25:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.245.145.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23974
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.245.145.125.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 18 06:50:41 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 125.145.245.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 125.145.245.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.155.87.54 attack
04/01/2020-08:41:55.301107 27.155.87.54 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2020-04-01 23:40:00
89.136.52.0 attackspam
Apr  1 15:59:26 ArkNodeAT sshd\[23015\]: Invalid user wusifan from 89.136.52.0
Apr  1 15:59:26 ArkNodeAT sshd\[23015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.136.52.0
Apr  1 15:59:28 ArkNodeAT sshd\[23015\]: Failed password for invalid user wusifan from 89.136.52.0 port 52993 ssh2
2020-04-01 23:34:07
148.251.49.107 attackbotsspam
20 attempts against mh-misbehave-ban on storm
2020-04-01 23:24:21
147.158.112.199 attackbots
88/tcp 81/tcp
[2020-04-01]2pkt
2020-04-01 22:48:18
189.146.216.113 attackbotsspam
8000/tcp
[2020-04-01]1pkt
2020-04-01 22:43:44
89.40.114.6 attack
Apr  1 14:33:37 pornomens sshd\[15361\]: Invalid user admin from 89.40.114.6 port 55978
Apr  1 14:33:37 pornomens sshd\[15361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.40.114.6
Apr  1 14:33:38 pornomens sshd\[15361\]: Failed password for invalid user admin from 89.40.114.6 port 55978 ssh2
...
2020-04-01 23:09:39
222.186.30.76 attack
Apr  1 16:42:36 dcd-gentoo sshd[15266]: User root from 222.186.30.76 not allowed because none of user's groups are listed in AllowGroups
Apr  1 16:42:38 dcd-gentoo sshd[15266]: error: PAM: Authentication failure for illegal user root from 222.186.30.76
Apr  1 16:42:36 dcd-gentoo sshd[15266]: User root from 222.186.30.76 not allowed because none of user's groups are listed in AllowGroups
Apr  1 16:42:38 dcd-gentoo sshd[15266]: error: PAM: Authentication failure for illegal user root from 222.186.30.76
Apr  1 16:42:36 dcd-gentoo sshd[15266]: User root from 222.186.30.76 not allowed because none of user's groups are listed in AllowGroups
Apr  1 16:42:38 dcd-gentoo sshd[15266]: error: PAM: Authentication failure for illegal user root from 222.186.30.76
Apr  1 16:42:38 dcd-gentoo sshd[15266]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.76 port 44860 ssh2
...
2020-04-01 22:46:25
88.91.13.216 attackspambots
(sshd) Failed SSH login from 88.91.13.216 (NO/Norway/ti2999a430-0215.bb.online.no): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  1 17:12:59 ubnt-55d23 sshd[13059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.91.13.216  user=root
Apr  1 17:13:01 ubnt-55d23 sshd[13059]: Failed password for root from 88.91.13.216 port 33602 ssh2
2020-04-01 23:37:55
54.180.99.6 attackspam
1900/udp
[2020-04-01]1pkt
2020-04-01 22:47:07
119.41.206.177 attack
Brute Force
2020-04-01 23:40:23
89.40.120.160 attackspam
2020-04-01T14:26:25.665078vps773228.ovh.net sshd[4492]: Failed password for root from 89.40.120.160 port 33534 ssh2
2020-04-01T14:30:11.996023vps773228.ovh.net sshd[5928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.40.120.160  user=root
2020-04-01T14:30:13.446881vps773228.ovh.net sshd[5928]: Failed password for root from 89.40.120.160 port 45260 ssh2
2020-04-01T14:34:10.111300vps773228.ovh.net sshd[7382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.40.120.160  user=root
2020-04-01T14:34:12.375104vps773228.ovh.net sshd[7382]: Failed password for root from 89.40.120.160 port 56988 ssh2
...
2020-04-01 22:41:19
137.74.199.180 attack
$f2bV_matches
2020-04-01 22:55:15
208.91.109.90 attack
firewall-block, port(s): 8882/tcp, 8883/tcp
2020-04-01 23:13:50
103.79.169.34 attackspambots
Apr  1 08:33:54 mail sshd\[64272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.79.169.34  user=root
...
2020-04-01 22:59:03
54.39.163.64 attackbots
SSH bruteforce (Triggered fail2ban)
2020-04-01 23:33:02

Recently Reported IPs

92.53.65.136 204.120.109.146 183.103.35.198 46.94.45.117
85.209.3.108 43.250.9.14 216.144.240.30 183.45.186.45
213.224.20.234 151.66.53.222 45.168.180.47 125.99.128.226
165.84.186.188 59.25.197.158 91.243.166.216 198.58.11.86
194.34.107.76 104.255.101.21 104.255.101.19 220.94.205.222