Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.45.173.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.45.173.128.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 05:10:03 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 128.173.45.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 128.173.45.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.167.145.24 attack
Unauthorized connection attempt from IP address 14.167.145.24 on Port 445(SMB)
2020-02-25 05:58:50
112.85.42.172 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Failed password for root from 112.85.42.172 port 55195 ssh2
Failed password for root from 112.85.42.172 port 55195 ssh2
Failed password for root from 112.85.42.172 port 55195 ssh2
Failed password for root from 112.85.42.172 port 55195 ssh2
2020-02-25 06:26:47
36.72.214.21 attackbots
Unauthorized connection attempt from IP address 36.72.214.21 on Port 445(SMB)
2020-02-25 06:13:43
103.224.216.215 attack
1582550254 - 02/24/2020 14:17:34 Host: 103.224.216.215/103.224.216.215 Port: 445 TCP Blocked
2020-02-25 06:15:47
103.124.92.220 attackspambots
B: Abusive content scan (200)
2020-02-25 06:05:33
49.50.236.221 attack
Unauthorized connection attempt detected from IP address 49.50.236.221 to port 445
2020-02-25 06:05:21
85.105.247.208 attackspambots
Unauthorized connection attempt from IP address 85.105.247.208 on Port 445(SMB)
2020-02-25 05:58:05
77.206.27.28 attack
24.02.2020 14:18:32 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2020-02-25 05:50:57
190.200.132.143 attack
Port probing on unauthorized port 445
2020-02-25 05:55:22
190.96.238.229 attack
Port probing on unauthorized port 23
2020-02-25 06:15:26
1.53.217.208 attackbotsspam
Unauthorized connection attempt detected from IP address 1.53.217.208 to port 445
2020-02-25 05:50:32
138.68.70.13 attackbotsspam
bad bad
2020-02-25 06:19:08
101.37.118.54 attack
Automatic report - Banned IP Access
2020-02-25 05:55:06
110.77.240.69 attack
Unauthorized connection attempt from IP address 110.77.240.69 on Port 445(SMB)
2020-02-25 06:28:37
27.72.73.25 attack
Unauthorized connection attempt from IP address 27.72.73.25 on Port 445(SMB)
2020-02-25 06:08:01

Recently Reported IPs

104.45.17.196 104.45.182.162 104.45.190.78 104.45.194.1
104.45.226.98 104.45.218.101 104.45.231.79 104.45.64.184
104.45.237.161 104.45.25.190 104.45.64.41 104.45.66.65
104.45.71.244 104.45.74.46 104.45.89.47 104.45.89.11
104.46.101.59 104.46.115.14 104.46.104.203 104.46.32.251