Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.245.201.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26611
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.245.201.38.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:13:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
38.201.245.104.in-addr.arpa domain name pointer 104-245-201-38.host1.yyz01.as63447.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
38.201.245.104.in-addr.arpa	name = 104-245-201-38.host1.yyz01.as63447.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.55.140.231 attackbots
Unauthorized connection attempt detected from IP address 61.55.140.231 to port 445
2019-12-31 21:57:09
101.19.57.67 attackbotsspam
Unauthorized connection attempt detected from IP address 101.19.57.67 to port 23
2019-12-31 21:16:20
117.135.226.92 attack
Unauthorized connection attempt detected from IP address 117.135.226.92 to port 1433
2019-12-31 21:48:37
183.238.195.231 attack
Unauthorized connection attempt detected from IP address 183.238.195.231 to port 1433
2019-12-31 21:37:36
60.173.155.27 attack
Unauthorized connection attempt detected from IP address 60.173.155.27 to port 23
2019-12-31 21:57:39
182.96.29.21 attackbotsspam
Unauthorized connection attempt detected from IP address 182.96.29.21 to port 445
2019-12-31 21:43:24
185.153.196.80 attack
ET DROP Dshield Block Listed Source group 1 - port: 3773 proto: TCP cat: Misc Attack
2019-12-31 21:36:57
111.56.63.22 attackspambots
firewall-block, port(s): 1433/tcp
2019-12-31 21:53:12
120.209.45.13 attack
Unauthorized connection attempt detected from IP address 120.209.45.13 to port 23
2019-12-31 21:47:43
183.30.201.241 attackspam
Unauthorized connection attempt detected from IP address 183.30.201.241 to port 1433
2019-12-31 21:38:25
112.35.139.22 attackspam
Unauthorized connection attempt detected from IP address 112.35.139.22 to port 7001
2019-12-31 21:52:43
175.4.219.244 attack
Unauthorized connection attempt detected from IP address 175.4.219.244 to port 7574
2019-12-31 21:45:53
115.86.177.84 attackspambots
Unauthorized connection attempt detected from IP address 115.86.177.84 to port 26
2019-12-31 21:50:50
178.128.80.95 attackbotsspam
Unauthorized connection attempt detected from IP address 178.128.80.95 to port 3389
2019-12-31 21:44:19
218.87.50.255 attack
Unauthorized connection attempt detected from IP address 218.87.50.255 to port 445
2019-12-31 21:33:08

Recently Reported IPs

104.21.27.188 6.93.32.145 42.124.233.201 104.245.201.39
104.245.201.49 104.245.237.107 104.21.3.99 44.154.96.1
104.245.35.242 104.245.36.73 104.245.37.139 104.245.38.236
104.21.4.144 104.21.4.41 104.246.223.182 104.21.37.204
104.21.38.5 104.21.38.16 104.21.38.214 104.247.194.50