Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: New York

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.67.3.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.67.3.145.			IN	A

;; AUTHORITY SECTION:
.			201	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040901 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 10 06:15:47 CST 2022
;; MSG SIZE  rcvd: 105
Host info
145.3.67.104.in-addr.arpa domain name pointer a104-67-3-145.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.3.67.104.in-addr.arpa	name = a104-67-3-145.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.163 attackbotsspam
May 13 11:25:21 ip-172-31-61-156 sshd[5188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
May 13 11:25:23 ip-172-31-61-156 sshd[5188]: Failed password for root from 222.186.175.163 port 31874 ssh2
...
2020-05-13 19:29:20
185.210.180.123 attackspam
May 13 13:29:39 our-server-hostname postfix/smtpd[11139]: connect from unknown[185.210.180.123]
May 13 13:29:40 our-server-hostname postfix/smtpd[11139]: NOQUEUE: reject: RCPT from unknown[185.210.180.123]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
May 13 13:29:41 our-server-hostname postfix/smtpd[11139]: lost connection after RCPT from unknown[185.210.180.123]
May 13 13:29:41 our-server-hostname postfix/smtpd[11139]: disconnect from unknown[185.210.180.123]
May 13 13:37:58 our-server-hostname postfix/smtpd[12547]: connect from unknown[185.210.180.123]
May 13 13:37:59 our-server-hostname postfix/smtpd[12547]: NOQUEUE: reject: RCPT from unknown[185.210.180.123]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
May 13 13:37:59 our-server-hostname postfix/smtpd[12547]: lost connection after RCPT from unknown[185.210.180.123]
May 13 13:37:59 our-server-hostname postfix/smtpd[12547........
-------------------------------
2020-05-13 19:07:34
162.243.136.218 attack
Connection by 162.243.136.218 on port: 3128 got caught by honeypot at 5/13/2020 4:50:15 AM
2020-05-13 19:17:44
106.13.21.24 attackspambots
2020-05-13T08:01:19.199397  sshd[4922]: Invalid user lundi from 106.13.21.24 port 41488
2020-05-13T08:01:19.213420  sshd[4922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.21.24
2020-05-13T08:01:19.199397  sshd[4922]: Invalid user lundi from 106.13.21.24 port 41488
2020-05-13T08:01:20.960137  sshd[4922]: Failed password for invalid user lundi from 106.13.21.24 port 41488 ssh2
...
2020-05-13 19:09:12
51.75.201.137 attackbots
$f2bV_matches
2020-05-13 18:50:55
36.72.219.123 attack
port scan and connect, tcp 22 (ssh)
2020-05-13 18:54:55
106.13.78.137 attackspambots
May 13 08:56:35 pkdns2 sshd\[62046\]: Invalid user admin from 106.13.78.137May 13 08:56:37 pkdns2 sshd\[62046\]: Failed password for invalid user admin from 106.13.78.137 port 26952 ssh2May 13 09:00:55 pkdns2 sshd\[62261\]: Invalid user wps from 106.13.78.137May 13 09:00:57 pkdns2 sshd\[62261\]: Failed password for invalid user wps from 106.13.78.137 port 18401 ssh2May 13 09:05:13 pkdns2 sshd\[62578\]: Invalid user admin from 106.13.78.137May 13 09:05:16 pkdns2 sshd\[62578\]: Failed password for invalid user admin from 106.13.78.137 port 9856 ssh2
...
2020-05-13 19:24:16
104.236.224.69 attack
May 13 07:39:37 ws26vmsma01 sshd[212920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.224.69
May 13 07:39:39 ws26vmsma01 sshd[212920]: Failed password for invalid user bill from 104.236.224.69 port 46906 ssh2
...
2020-05-13 19:32:18
167.71.202.162 attackspam
[ssh] SSH attack
2020-05-13 19:09:33
106.12.8.103 attack
2020-05-13T06:01:20.940615homeassistant sshd[7854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.103  user=root
2020-05-13T06:01:23.160158homeassistant sshd[7854]: Failed password for root from 106.12.8.103 port 36162 ssh2
...
2020-05-13 19:02:58
139.199.59.31 attackspambots
2020-05-13T12:06:35.172207afi-git.jinr.ru sshd[14822]: Invalid user info from 139.199.59.31 port 56895
2020-05-13T12:06:35.175301afi-git.jinr.ru sshd[14822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.59.31
2020-05-13T12:06:35.172207afi-git.jinr.ru sshd[14822]: Invalid user info from 139.199.59.31 port 56895
2020-05-13T12:06:37.286859afi-git.jinr.ru sshd[14822]: Failed password for invalid user info from 139.199.59.31 port 56895 ssh2
2020-05-13T12:09:11.333864afi-git.jinr.ru sshd[15625]: Invalid user postgres from 139.199.59.31 port 29928
...
2020-05-13 19:21:45
148.70.169.14 attackbotsspam
May 12 19:04:47 auw2 sshd\[31635\]: Invalid user teamspeak3 from 148.70.169.14
May 12 19:04:47 auw2 sshd\[31635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.169.14
May 12 19:04:49 auw2 sshd\[31635\]: Failed password for invalid user teamspeak3 from 148.70.169.14 port 39442 ssh2
May 12 19:10:32 auw2 sshd\[32079\]: Invalid user build from 148.70.169.14
May 12 19:10:32 auw2 sshd\[32079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.169.14
2020-05-13 19:08:09
104.131.189.185 attackbots
May 13 11:52:23 mail sshd\[9307\]: Invalid user rstudio from 104.131.189.185
May 13 11:52:23 mail sshd\[9307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.185
May 13 11:52:25 mail sshd\[9307\]: Failed password for invalid user rstudio from 104.131.189.185 port 56518 ssh2
...
2020-05-13 19:18:23
203.162.31.112 attackspambots
xmlrpc attack
2020-05-13 19:21:22
51.38.230.59 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-05-13 19:23:20

Recently Reported IPs

104.66.243.49 104.67.3.194 104.68.124.177 104.68.246.46
104.68.247.111 104.69.218.88 104.70.121.25 104.70.121.43
104.71.181.113 64.122.88.116 104.71.184.121 104.71.186.60
104.71.218.11 104.71.218.66 104.73.67.69 104.74.65.136
104.74.65.178 104.74.65.179 104.74.65.50 104.75.230.36