Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.45.41.45 attackbots
104.45.41.45 - - [13/Oct/2020:22:53:08 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.45.41.45 - - [13/Oct/2020:23:07:16 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-14 06:33:03
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 104.45.41.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;104.45.41.56.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:16:13 CST 2021
;; MSG SIZE  rcvd: 41

'
Host info
Host 56.41.45.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.41.45.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.186.207.209 attackbotsspam
Unauthorized connection attempt from IP address 113.186.207.209 on Port 445(SMB)
2019-09-24 03:27:01
177.156.148.167 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/177.156.148.167/ 
 BR - 1H : (767)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN18881 
 
 IP : 177.156.148.167 
 
 CIDR : 177.156.128.0/19 
 
 PREFIX COUNT : 938 
 
 UNIQUE IP COUNT : 4233472 
 
 
 WYKRYTE ATAKI Z ASN18881 :  
  1H - 6 
  3H - 23 
  6H - 43 
 12H - 58 
 24H - 64 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 03:53:58
94.29.124.85 attack
Unauthorized connection attempt from IP address 94.29.124.85 on Port 445(SMB)
2019-09-24 03:47:59
80.82.64.127 attack
09/23/2019-21:11:21.340387 80.82.64.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2019-09-24 03:27:33
213.59.184.21 attackbots
Sep 23 05:05:23 eddieflores sshd\[16396\]: Invalid user Q!W@E\#R\$ from 213.59.184.21
Sep 23 05:05:23 eddieflores sshd\[16396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.184.21
Sep 23 05:05:25 eddieflores sshd\[16396\]: Failed password for invalid user Q!W@E\#R\$ from 213.59.184.21 port 38396 ssh2
Sep 23 05:09:11 eddieflores sshd\[16771\]: Invalid user 123456 from 213.59.184.21
Sep 23 05:09:11 eddieflores sshd\[16771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.184.21
2019-09-24 03:47:16
123.255.249.146 attackspam
Automatic report - Port Scan Attack
2019-09-24 03:40:59
92.118.37.83 attackspam
Sep 23 21:17:42 mc1 kernel: \[552710.297757\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.83 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=46807 PROTO=TCP SPT=42114 DPT=5734 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 23 21:18:52 mc1 kernel: \[552780.104664\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.83 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=56617 PROTO=TCP SPT=42114 DPT=3521 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 23 21:22:46 mc1 kernel: \[553014.523553\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.83 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=14193 PROTO=TCP SPT=42114 DPT=4501 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-24 03:33:10
78.186.159.63 attackbotsspam
Unauthorized connection attempt from IP address 78.186.159.63 on Port 445(SMB)
2019-09-24 03:46:52
79.1.212.37 attackbotsspam
Sep 23 18:57:02 monocul sshd[31992]: Invalid user Test from 79.1.212.37 port 60913
...
2019-09-24 03:16:39
218.173.234.221 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/218.173.234.221/ 
 TW - 1H : (2797)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 218.173.234.221 
 
 CIDR : 218.173.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 283 
  3H - 1110 
  6H - 2237 
 12H - 2700 
 24H - 2709 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 03:29:47
120.92.138.124 attack
Sep 23 12:09:37 ny01 sshd[9670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.138.124
Sep 23 12:09:39 ny01 sshd[9670]: Failed password for invalid user rpcuser from 120.92.138.124 port 30102 ssh2
Sep 23 12:14:49 ny01 sshd[10560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.138.124
2019-09-24 03:38:34
103.205.133.77 attackbots
Sep 23 21:00:42 MK-Soft-VM7 sshd[24593]: Failed password for root from 103.205.133.77 port 58970 ssh2
...
2019-09-24 03:21:06
106.12.108.90 attackspam
Sep 23 19:45:37 bouncer sshd\[20072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.90  user=root
Sep 23 19:45:40 bouncer sshd\[20072\]: Failed password for root from 106.12.108.90 port 33004 ssh2
Sep 23 19:49:49 bouncer sshd\[20106\]: Invalid user ofbiz from 106.12.108.90 port 34000
...
2019-09-24 03:41:45
119.28.24.83 attack
Sep 23 16:58:17 core sshd[9632]: Invalid user professor from 119.28.24.83 port 57424
Sep 23 16:58:19 core sshd[9632]: Failed password for invalid user professor from 119.28.24.83 port 57424 ssh2
...
2019-09-24 03:44:45
111.231.54.248 attackspambots
Sep 23 14:09:54 plusreed sshd[5981]: Invalid user nancys from 111.231.54.248
...
2019-09-24 03:37:31

Recently Reported IPs

76.45.33.3 89.205.227.147 62.89.210.49 78.69.41.57
13.212.6.108 13.212.6.178 149.56.171.125 23.148.145.28
142.93.195.169 34.86.35.22 172.58.121.218 24.72.66.44
174.90.223.82 207.46.13.134 40.77.167.58 138.63.253.189
192.241.210.196 67.69.76.74 165.68.127.207 143.198.53.174