Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.45.255.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.45.255.205.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 12:10:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 205.255.45.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 205.255.45.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.249.52.5 attackspam
Dec  4 19:52:15 XXX sshd[1412]: Invalid user www-data from 103.249.52.5 port 46258
2019-12-05 07:14:39
159.203.143.58 attack
2019-12-04T22:36:36.063842abusebot-7.cloudsearch.cf sshd\[17236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bangazon.com  user=root
2019-12-05 06:54:54
213.208.190.10 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-05 06:45:01
159.203.201.228 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-12-05 07:10:33
222.186.190.92 attack
Dec  4 23:29:31 h2177944 sshd\[3767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
Dec  4 23:29:33 h2177944 sshd\[3767\]: Failed password for root from 222.186.190.92 port 35104 ssh2
Dec  4 23:29:36 h2177944 sshd\[3767\]: Failed password for root from 222.186.190.92 port 35104 ssh2
Dec  4 23:29:39 h2177944 sshd\[3767\]: Failed password for root from 222.186.190.92 port 35104 ssh2
...
2019-12-05 07:05:11
103.121.26.150 attackspambots
Dec  4 19:41:22 zeus sshd[3774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.26.150 
Dec  4 19:41:24 zeus sshd[3774]: Failed password for invalid user laksov from 103.121.26.150 port 6060 ssh2
Dec  4 19:48:41 zeus sshd[4014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.26.150 
Dec  4 19:48:43 zeus sshd[4014]: Failed password for invalid user guest from 103.121.26.150 port 29596 ssh2
2019-12-05 07:03:43
93.80.86.219 attackbots
Unauthorised access (Dec  4) SRC=93.80.86.219 LEN=52 TTL=115 ID=27599 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-05 06:41:43
41.196.0.189 attackbotsspam
SSH bruteforce
2019-12-05 07:13:27
111.231.54.248 attackbots
Dec  4 20:12:56 Ubuntu-1404-trusty-64-minimal sshd\[23707\]: Invalid user ident from 111.231.54.248
Dec  4 20:12:56 Ubuntu-1404-trusty-64-minimal sshd\[23707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.248
Dec  4 20:12:58 Ubuntu-1404-trusty-64-minimal sshd\[23707\]: Failed password for invalid user ident from 111.231.54.248 port 58253 ssh2
Dec  4 20:24:57 Ubuntu-1404-trusty-64-minimal sshd\[2797\]: Invalid user fogstad from 111.231.54.248
Dec  4 20:24:57 Ubuntu-1404-trusty-64-minimal sshd\[2797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.248
2019-12-05 06:43:28
107.173.28.172 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-12-05 07:16:54
118.25.25.207 attack
Dec  4 20:24:46 ns41 sshd[21264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.25.207
Dec  4 20:24:46 ns41 sshd[21264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.25.207
2019-12-05 06:40:41
156.220.179.77 attackspam
Honeypot attack, port: 23, PTR: host-156.220.77.179-static.tedata.net.
2019-12-05 06:48:52
218.92.0.134 attackbotsspam
Dec  4 23:32:59 srv206 sshd[25180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.134  user=root
Dec  4 23:33:01 srv206 sshd[25180]: Failed password for root from 218.92.0.134 port 29038 ssh2
...
2019-12-05 07:00:30
191.55.190.150 attack
Honeypot attack, port: 5555, PTR: 191-055-190-150.xd-dynamic.algartelecom.com.br.
2019-12-05 06:52:15
114.32.184.203 attackbotsspam
Honeypot attack, port: 81, PTR: 114-32-184-203.HINET-IP.hinet.net.
2019-12-05 07:00:04

Recently Reported IPs

198.56.94.116 171.54.173.93 51.81.243.145 141.51.146.250
174.166.33.15 140.92.103.53 255.146.198.114 166.236.234.31
232.139.98.115 221.19.150.64 185.42.247.124 255.197.202.198
66.140.121.186 88.44.73.94 13.224.12.82 68.214.22.14
18.87.84.36 186.167.181.247 85.203.201.237 254.158.243.110