Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.245.66.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.245.66.62.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 16:05:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 62.66.245.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 62.66.245.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.234.122.94 attackspambots
May 25 13:55:21 legacy sshd[5753]: Failed password for root from 49.234.122.94 port 51606 ssh2
May 25 13:59:43 legacy sshd[5854]: Failed password for root from 49.234.122.94 port 42396 ssh2
May 25 14:04:01 legacy sshd[5996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.122.94
...
2020-05-25 20:23:57
85.94.143.183 attack
Honeypot attack, port: 445, PTR: adsl11po183.tel.net.ba.
2020-05-25 20:36:49
62.171.182.38 attackbots
Lines containing failures of 62.171.182.38 (max 1000)
May 25 13:45:47 efa3 sshd[31309]: Failed password for r.r from 62.171.182.38 port 57042 ssh2
May 25 13:45:47 efa3 sshd[31309]: Received disconnect from 62.171.182.38 port 57042:11: Bye Bye [preauth]
May 25 13:45:47 efa3 sshd[31309]: Disconnected from 62.171.182.38 port 57042 [preauth]
May 25 13:45:50 efa3 sshd[31314]: Failed password for admin from 62.171.182.38 port 44794 ssh2
May 25 13:45:50 efa3 sshd[31314]: Received disconnect from 62.171.182.38 port 44794:11: Bye Bye [preauth]
May 25 13:45:50 efa3 sshd[31314]: Disconnected from 62.171.182.38 port 44794 [preauth]
May 25 13:45:52 efa3 sshd[31317]: Failed password for admin from 62.171.182.38 port 34224 ssh2
May 25 13:45:52 efa3 sshd[31317]: Received disconnect from 62.171.182.38 port 34224:11: Bye Bye [preauth]
May 25 13:45:52 efa3 sshd[31317]: Disconnected from 62.171.182.38 port 34224 [preauth]
May 25 13:45:52 efa3 sshd[31320]: Invalid user user from 62.171.182.3........
------------------------------
2020-05-25 20:47:36
183.89.73.28 attackspam
Honeypot attack, port: 445, PTR: mx-ll-183.89.73-28.dynamic.3bb.in.th.
2020-05-25 20:25:45
202.243.92.137 attack
Honeypot attack, port: 5555, PTR: d-202-243-92-137.d-cable.katch.ne.jp.
2020-05-25 20:18:44
145.239.220.229 attackbots
Automatic report - XMLRPC Attack
2020-05-25 20:44:27
118.174.196.212 attackspam
1590408217 - 05/25/2020 14:03:37 Host: 118.174.196.212/118.174.196.212 Port: 445 TCP Blocked
2020-05-25 20:54:16
171.5.169.18 attackspambots
Honeypot attack, port: 445, PTR: mx-ll-171.5.169-18.dynamic.3bb.in.th.
2020-05-25 20:31:36
129.28.166.61 attackbots
May 25 14:35:33 vps639187 sshd\[3526\]: Invalid user herrestad from 129.28.166.61 port 35248
May 25 14:35:33 vps639187 sshd\[3526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.166.61
May 25 14:35:35 vps639187 sshd\[3526\]: Failed password for invalid user herrestad from 129.28.166.61 port 35248 ssh2
...
2020-05-25 20:55:07
220.171.43.15 attackbots
May 25 05:00:15 mockhub sshd[13452]: Failed password for root from 220.171.43.15 port 12060 ssh2
...
2020-05-25 21:01:53
139.155.21.186 attackspambots
May 25 14:03:37 ns3164893 sshd[9358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.21.186  user=root
May 25 14:03:39 ns3164893 sshd[9358]: Failed password for root from 139.155.21.186 port 55062 ssh2
...
2020-05-25 20:51:09
210.16.88.179 attack
(smtpauth) Failed SMTP AUTH login from 210.16.88.179 (IN/India/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-25 16:33:51 plain authenticator failed for ([210.16.88.179]) [210.16.88.179]: 535 Incorrect authentication data (set_id=k.sheikhan@safanicu.com)
2020-05-25 20:29:23
87.251.74.84 attackbotsspam
May 25 14:08:39 mail postfix/submission/smtpd[23027]: lost connection after UNKNOWN from unknown[87.251.74.84]
...
2020-05-25 20:49:50
103.70.199.185 attack
Honeypot hit.
2020-05-25 20:30:50
198.71.239.46 attack
Automatic report - XMLRPC Attack
2020-05-25 20:42:02

Recently Reported IPs

84.97.107.150 231.243.176.178 221.69.234.138 67.20.13.247
55.209.125.172 127.39.98.174 241.91.255.32 5.133.24.8
37.191.29.109 89.227.18.230 176.17.9.196 150.106.234.178
140.27.227.123 26.81.80.14 176.173.100.245 104.236.202.45
79.87.127.202 197.169.199.182 75.4.138.253 209.28.62.45