Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Washington

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.45.187.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.45.187.215.			IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010701 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 08 03:43:02 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 215.187.45.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.187.45.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.253.24.250 attackbots
Aug  4 14:33:24 serwer sshd\[17931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.24.250  user=root
Aug  4 14:33:26 serwer sshd\[17931\]: Failed password for root from 211.253.24.250 port 41279 ssh2
Aug  4 14:41:06 serwer sshd\[19741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.24.250  user=root
...
2020-08-05 01:28:23
112.111.249.31 attackbotsspam
SSH brute-force attempt
2020-08-05 01:18:21
192.241.173.142 attackspambots
$f2bV_matches
2020-08-05 01:13:04
209.17.97.2 attack
 TCP (SYN) 209.17.97.2:50876 -> port 443, len 44
2020-08-05 00:58:17
54.37.162.36 attack
Aug  4 13:51:09 piServer sshd[6853]: Failed password for root from 54.37.162.36 port 42942 ssh2
Aug  4 13:53:57 piServer sshd[7113]: Failed password for root from 54.37.162.36 port 35280 ssh2
...
2020-08-05 01:27:34
125.59.39.112 attackbots
Port probing on unauthorized port 5555
2020-08-05 01:14:38
211.208.225.110 attackbots
bruteforce detected
2020-08-05 01:30:47
51.15.46.184 attackbots
prod8
...
2020-08-05 01:36:32
222.186.175.202 attackspambots
2020-08-04T13:18:52.183192uwu-server sshd[2945147]: Failed password for root from 222.186.175.202 port 57118 ssh2
2020-08-04T13:18:56.652513uwu-server sshd[2945147]: Failed password for root from 222.186.175.202 port 57118 ssh2
2020-08-04T13:19:01.502067uwu-server sshd[2945147]: Failed password for root from 222.186.175.202 port 57118 ssh2
2020-08-04T13:19:06.346385uwu-server sshd[2945147]: Failed password for root from 222.186.175.202 port 57118 ssh2
2020-08-04T13:19:11.859822uwu-server sshd[2945147]: Failed password for root from 222.186.175.202 port 57118 ssh2
...
2020-08-05 01:21:39
185.220.101.199 attackspambots
Unauthorized access to SSH at 4/Aug/2020:16:28:04 +0000.
Received:  (SSH-2.0-libssh2_1.9.0)
2020-08-05 01:02:39
196.189.26.135 attack
Port probing on unauthorized port 445
2020-08-05 01:22:47
167.71.36.101 attack
2020-08-04T16:17:40.644440v22018076590370373 sshd[32269]: Failed password for root from 167.71.36.101 port 42686 ssh2
2020-08-04T16:25:19.285281v22018076590370373 sshd[16838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.36.101  user=root
2020-08-04T16:25:20.987312v22018076590370373 sshd[16838]: Failed password for root from 167.71.36.101 port 50526 ssh2
2020-08-04T16:32:53.222259v22018076590370373 sshd[7403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.36.101  user=root
2020-08-04T16:32:55.251159v22018076590370373 sshd[7403]: Failed password for root from 167.71.36.101 port 57792 ssh2
...
2020-08-05 01:16:04
51.91.100.109 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-05 01:29:57
58.87.114.13 attackspam
Aug  4 14:09:39 lukav-desktop sshd\[12314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.13  user=root
Aug  4 14:09:42 lukav-desktop sshd\[12314\]: Failed password for root from 58.87.114.13 port 59262 ssh2
Aug  4 14:11:18 lukav-desktop sshd\[15267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.13  user=root
Aug  4 14:11:21 lukav-desktop sshd\[15267\]: Failed password for root from 58.87.114.13 port 51232 ssh2
Aug  4 14:13:05 lukav-desktop sshd\[22050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.13  user=root
2020-08-05 01:08:45
64.20.49.24 attackspam
[portscan] tcp/22 [SSH]
*(RWIN=65535)(08041100)
2020-08-05 01:12:01

Recently Reported IPs

166.137.191.23 34.67.109.28 107.122.17.204 37.173.22.219
165.55.246.142 67.155.59.73 147.144.103.199 177.132.53.166
218.71.75.129 27.31.182.120 201.46.18.207 97.119.191.49
64.0.204.69 37.126.35.75 117.213.72.177 126.245.145.93
67.239.169.129 3.8.236.125 220.32.26.76 222.23.218.220