Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Washington

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.45.160.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.45.160.221.			IN	A

;; AUTHORITY SECTION:
.			378	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060601 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 07 06:31:20 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 221.160.45.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.160.45.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.102.51.16 attackspam
[H1.VM8] Blocked by UFW
2020-07-11 04:42:45
159.89.53.92 attackspam
Invalid user idempiere from 159.89.53.92 port 46560
2020-07-11 05:08:28
54.36.67.205 attackspam
23/tcp
[2020-07-10]1pkt
2020-07-11 04:32:32
175.139.3.41 attack
Unauthorized SSH login attempts
2020-07-11 05:04:07
180.215.64.98 attack
10.07.2020 19:46:33 - Wordpress fail 
Detected by ELinOX-ALM
2020-07-11 04:50:28
45.227.254.30 attackspambots
 TCP (SYN) 45.227.254.30:58003 -> port 3392, len 44
2020-07-11 04:52:26
112.85.42.173 attack
Jul 10 17:04:02 ny01 sshd[20448]: Failed password for root from 112.85.42.173 port 54287 ssh2
Jul 10 17:04:08 ny01 sshd[20474]: Failed password for root from 112.85.42.173 port 13734 ssh2
Jul 10 17:04:12 ny01 sshd[20474]: Failed password for root from 112.85.42.173 port 13734 ssh2
2020-07-11 05:04:49
185.233.186.240 attack
 TCP (SYN) 185.233.186.240:17841 -> port 8080, len 40
2020-07-11 04:32:49
134.122.117.242 attack
firewall-block, port(s): 10796/tcp
2020-07-11 04:54:21
170.106.9.125 attackbots
SSH Brute-Force reported by Fail2Ban
2020-07-11 04:53:44
49.235.111.100 attackbots
2020-07-10 20:38:19,864 fail2ban.actions: WARNING [ssh] Ban 49.235.111.100
2020-07-11 05:03:19
177.0.108.210 attackspambots
Total attacks: 2
2020-07-11 04:59:24
61.177.172.54 attackbots
2020-07-10T23:52:05.154775afi-git.jinr.ru sshd[8492]: Failed password for root from 61.177.172.54 port 40787 ssh2
2020-07-10T23:52:08.297547afi-git.jinr.ru sshd[8492]: Failed password for root from 61.177.172.54 port 40787 ssh2
2020-07-10T23:52:11.519428afi-git.jinr.ru sshd[8492]: Failed password for root from 61.177.172.54 port 40787 ssh2
2020-07-10T23:52:11.519552afi-git.jinr.ru sshd[8492]: error: maximum authentication attempts exceeded for root from 61.177.172.54 port 40787 ssh2 [preauth]
2020-07-10T23:52:11.519566afi-git.jinr.ru sshd[8492]: Disconnecting: Too many authentication failures [preauth]
...
2020-07-11 04:59:40
112.4.152.244 attackbots
Auto Detect Rule!
proto TCP (SYN), 112.4.152.244:57212->gjan.info:1433, len 52
2020-07-11 04:40:00
185.220.101.198 attackspam
Unauthorized connection attempt detected from IP address 185.220.101.198 to port 7001
2020-07-11 05:08:12

Recently Reported IPs

92.213.46.103 178.38.143.248 149.97.182.184 31.27.144.185
81.192.178.174 188.190.23.102 61.215.55.12 160.172.3.37
91.137.1.31 103.88.235.197 125.227.26.24 79.192.115.58
80.144.70.198 156.241.191.208 63.186.40.22 39.158.37.140
60.11.111.55 123.74.117.107 14.198.96.90 141.204.210.240