Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.97.85.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.97.85.45.			IN	A

;; AUTHORITY SECTION:
.			276	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023111102 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 12 09:28:25 CST 2023
;; MSG SIZE  rcvd: 105
Host info
45.85.97.104.in-addr.arpa domain name pointer a104-97-85-45.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.85.97.104.in-addr.arpa	name = a104-97-85-45.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.211.120.99 attack
Jul 23 09:30:24 v22019038103785759 sshd\[22725\]: Invalid user vertica from 198.211.120.99 port 36104
Jul 23 09:30:24 v22019038103785759 sshd\[22725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.120.99
Jul 23 09:30:26 v22019038103785759 sshd\[22725\]: Failed password for invalid user vertica from 198.211.120.99 port 36104 ssh2
Jul 23 09:34:16 v22019038103785759 sshd\[22854\]: Invalid user vianney from 198.211.120.99 port 50750
Jul 23 09:34:16 v22019038103785759 sshd\[22854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.120.99
...
2020-07-23 18:13:00
210.5.85.150 attackspam
Invalid user ts1 from 210.5.85.150 port 39060
2020-07-23 18:35:51
115.132.187.64 attackspambots
Automatic report - XMLRPC Attack
2020-07-23 18:43:20
202.171.73.124 attack
CMS (WordPress or Joomla) login attempt.
2020-07-23 18:37:29
40.77.167.44 attackspam
IP 40.77.167.44 attacked honeypot on port: 80 at 7/22/2020 8:51:34 PM
2020-07-23 18:11:48
106.12.172.248 attackspam
Invalid user admin from 106.12.172.248 port 54666
2020-07-23 18:21:30
208.113.164.202 attack
Invalid user nss from 208.113.164.202 port 37722
2020-07-23 18:27:09
42.236.10.122 attack
Automated report (2020-07-23T14:51:09+08:00). Scraper detected at this address.
2020-07-23 18:11:19
122.51.39.232 attack
2020-07-23T06:54:46.131896abusebot-6.cloudsearch.cf sshd[29485]: Invalid user zeng from 122.51.39.232 port 45486
2020-07-23T06:54:46.137423abusebot-6.cloudsearch.cf sshd[29485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.39.232
2020-07-23T06:54:46.131896abusebot-6.cloudsearch.cf sshd[29485]: Invalid user zeng from 122.51.39.232 port 45486
2020-07-23T06:54:48.762369abusebot-6.cloudsearch.cf sshd[29485]: Failed password for invalid user zeng from 122.51.39.232 port 45486 ssh2
2020-07-23T06:58:26.670030abusebot-6.cloudsearch.cf sshd[29490]: Invalid user hadoop from 122.51.39.232 port 54296
2020-07-23T06:58:26.674242abusebot-6.cloudsearch.cf sshd[29490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.39.232
2020-07-23T06:58:26.670030abusebot-6.cloudsearch.cf sshd[29490]: Invalid user hadoop from 122.51.39.232 port 54296
2020-07-23T06:58:28.500880abusebot-6.cloudsearch.cf sshd[29490]: Failed 
...
2020-07-23 18:48:38
52.172.156.159 attackbotsspam
SSH brute-force attempt
2020-07-23 18:47:45
45.225.162.255 attack
Invalid user crew from 45.225.162.255 port 58418
2020-07-23 18:21:51
109.69.1.178 attackspambots
Jul 23 03:48:00 jumpserver sshd[191680]: Invalid user node from 109.69.1.178 port 46782
Jul 23 03:48:02 jumpserver sshd[191680]: Failed password for invalid user node from 109.69.1.178 port 46782 ssh2
Jul 23 03:52:01 jumpserver sshd[191730]: Invalid user robert from 109.69.1.178 port 43688
...
2020-07-23 18:14:16
157.230.216.233 attackspambots
Bruteforce detected by fail2ban
2020-07-23 18:18:33
59.125.33.59 attack
Icarus honeypot on github
2020-07-23 18:17:09
61.93.240.65 attackbots
Invalid user ibmadm from 61.93.240.65 port 49108
2020-07-23 18:49:16

Recently Reported IPs

73.157.59.128 111.90.250.109 134.35.227.191 35.218.54.195
172.17.55.17 221.15.81.206 124.217.251.184 95.214.52.232
122.96.31.249 157.230.193.102 108.181.123.103 121.228.102.22
5.229.82.241 161.98.137.62 206.9.213.167 229.141.169.202
223.72.15.150 84.26.100.166 173.82.154.175 160.12.241.79