Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Renfrew

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.245.253.208 attackspambots
SSHScan
2019-09-22 10:20:43
104.245.254.36 attack
vps1:sshd-InvalidUser
2019-08-02 22:02:10
104.245.204.72 attackspambots
Jun 13 14:52:49 ubuntu sshd[10845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.245.204.72
Jun 13 14:52:51 ubuntu sshd[10845]: Failed password for invalid user admin from 104.245.204.72 port 38748 ssh2
Jun 13 14:52:54 ubuntu sshd[10845]: Failed password for invalid user admin from 104.245.204.72 port 38748 ssh2
Jun 13 14:52:56 ubuntu sshd[10845]: Failed password for invalid user admin from 104.245.204.72 port 38748 ssh2
2019-07-31 23:45:45
104.245.253.208 attack
Jul 15 09:43:57 dallas01 sshd[1033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.245.253.208
Jul 15 09:43:59 dallas01 sshd[1033]: Failed password for invalid user admin from 104.245.253.208 port 33040 ssh2
Jul 15 09:44:02 dallas01 sshd[1033]: Failed password for invalid user admin from 104.245.253.208 port 33040 ssh2
Jul 15 09:44:04 dallas01 sshd[1033]: Failed password for invalid user admin from 104.245.253.208 port 33040 ssh2
2019-07-31 23:36:11
104.245.254.36 attackbotsspam
Jul 10 20:49:49 xxxxxxx0 sshd[9192]: Invalid user usuario from 104.245.254.36 port 37880
Jul 10 20:49:49 xxxxxxx0 sshd[9192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.245.254.36
Jul 10 20:49:52 xxxxxxx0 sshd[9192]: Failed password for invalid user usuario from 104.245.254.36 port 37880 ssh2
Jul 10 20:49:54 xxxxxxx0 sshd[9192]: Failed password for invalid user usuario from 104.245.254.36 port 37880 ssh2
Jul 10 20:49:56 xxxxxxx0 sshd[9192]: Failed password for invalid user usuario from 104.245.254.36 port 37880 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.245.254.36
2019-07-11 03:13:52
104.245.253.216 attackspam
Jun 30 15:12:00 shared09 sshd[25182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.245.253.216  user=r.r
Jun 30 15:12:01 shared09 sshd[25182]: Failed password for r.r from 104.245.253.216 port 40376 ssh2
Jun 30 15:12:03 shared09 sshd[25182]: Failed password for r.r from 104.245.253.216 port 40376 ssh2
Jun 30 15:12:05 shared09 sshd[25182]: Failed password for r.r from 104.245.253.216 port 40376 ssh2
Jun 30 15:12:08 shared09 sshd[25182]: Failed password for r.r from 104.245.253.216 port 40376 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.245.253.216
2019-07-01 01:22:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.245.2.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60655
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.245.2.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 10:49:18 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 149.2.245.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 149.2.245.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
45.148.10.189 attackbotsspam
SSH authentication failure
2020-03-03 18:37:02
138.97.93.136 attackspam
Mar  3 01:52:11 firewall sshd[22274]: Invalid user admin from 138.97.93.136
Mar  3 01:52:13 firewall sshd[22274]: Failed password for invalid user admin from 138.97.93.136 port 42211 ssh2
Mar  3 01:52:16 firewall sshd[22276]: Invalid user admin from 138.97.93.136
...
2020-03-03 18:19:27
159.65.158.30 attackbots
Mar  3 00:31:28 wbs sshd\[3754\]: Invalid user alex from 159.65.158.30
Mar  3 00:31:28 wbs sshd\[3754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.30
Mar  3 00:31:30 wbs sshd\[3754\]: Failed password for invalid user alex from 159.65.158.30 port 45842 ssh2
Mar  3 00:39:48 wbs sshd\[4552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.30  user=root
Mar  3 00:39:50 wbs sshd\[4552\]: Failed password for root from 159.65.158.30 port 59616 ssh2
2020-03-03 18:49:49
142.93.130.58 attackspambots
Mar  3 09:26:05 vps691689 sshd[8213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.130.58
Mar  3 09:26:07 vps691689 sshd[8213]: Failed password for invalid user wangxx from 142.93.130.58 port 39320 ssh2
...
2020-03-03 18:16:45
93.39.104.224 attackbots
Mar  2 19:51:13 web1 sshd\[28864\]: Invalid user weuser from 93.39.104.224
Mar  2 19:51:13 web1 sshd\[28864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.39.104.224
Mar  2 19:51:15 web1 sshd\[28864\]: Failed password for invalid user weuser from 93.39.104.224 port 51646 ssh2
Mar  2 19:55:05 web1 sshd\[29202\]: Invalid user igor from 93.39.104.224
Mar  2 19:55:05 web1 sshd\[29202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.39.104.224
2020-03-03 18:27:55
116.99.43.156 attackbotsspam
$f2bV_matches
2020-03-03 18:20:59
120.236.164.176 attackspambots
2020-03-02T20:20:30.360689hermes auth[178717]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=nologin rhost=120.236.164.176
...
2020-03-03 18:39:45
94.180.58.238 attackbots
Mar  3 13:16:53 lcl-usvr-02 sshd[29758]: Invalid user capture from 94.180.58.238 port 45974
Mar  3 13:16:53 lcl-usvr-02 sshd[29758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.58.238
Mar  3 13:16:53 lcl-usvr-02 sshd[29758]: Invalid user capture from 94.180.58.238 port 45974
Mar  3 13:16:55 lcl-usvr-02 sshd[29758]: Failed password for invalid user capture from 94.180.58.238 port 45974 ssh2
Mar  3 13:26:12 lcl-usvr-02 sshd[31771]: Invalid user wp-admin from 94.180.58.238 port 52546
...
2020-03-03 18:44:27
125.135.147.212 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-03 18:27:39
37.235.216.131 attackspam
Honeypot attack, port: 5555, PTR: 37-235-216-131.dynamic.customer.lanta.me.
2020-03-03 18:41:23
170.246.146.72 attackbots
SpamScore above: 10.0
2020-03-03 18:49:29
173.164.13.177 attackspam
Mar  3 09:43:19 server sshd[772681]: Failed password for invalid user wordpress from 173.164.13.177 port 35787 ssh2
Mar  3 10:02:52 server sshd[778599]: Failed password for invalid user pi from 173.164.13.177 port 40591 ssh2
Mar  3 10:20:01 server sshd[783437]: Failed password for invalid user test from 173.164.13.177 port 59473 ssh2
2020-03-03 18:27:19
185.36.81.23 attack
Mar  3 10:57:43 srv01 postfix/smtpd\[14325\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  3 11:02:58 srv01 postfix/smtpd\[14323\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  3 11:04:39 srv01 postfix/smtpd\[14315\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  3 11:05:17 srv01 postfix/smtpd\[14315\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  3 11:11:58 srv01 postfix/smtpd\[20996\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-03 18:35:45
183.49.46.50 attackbots
Mar  3 05:52:05 debian-2gb-nbg1-2 kernel: \[5470306.151184\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=183.49.46.50 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=114 ID=31783 DF PROTO=TCP SPT=23897 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2020-03-03 18:24:24
45.177.94.39 attackbotsspam
Automatic report - Port Scan Attack
2020-03-03 18:37:50

Recently Reported IPs

220.25.166.146 176.76.136.151 135.41.186.116 92.131.35.193
242.79.190.169 184.233.120.31 88.193.94.25 198.123.185.200
169.128.100.112 60.67.146.126 12.150.74.106 5.223.85.90
205.161.161.212 21.51.114.8 47.214.117.185 26.236.175.73
182.152.104.151 196.219.51.203 116.163.252.71 228.248.104.175