Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.104.45.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.104.45.132.			IN	A

;; AUTHORITY SECTION:
.			182	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 19:43:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
132.45.104.185.in-addr.arpa domain name pointer web377.default-host.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.45.104.185.in-addr.arpa	name = web377.default-host.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.124.43.56 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-11 18:04:04
93.92.60.43 attackbots
Automatic report - Port Scan Attack
2020-02-11 17:33:53
138.197.129.38 attack
invalid login attempt (ros)
2020-02-11 17:53:09
14.169.185.133 attackbots
Automatic report - SSH Brute-Force Attack
2020-02-11 17:51:08
37.252.69.104 attackbotsspam
Honeypot attack, port: 445, PTR: host-104.69.252.37.ucom.am.
2020-02-11 17:50:28
104.206.128.78 attackspam
Honeypot attack, port: 81, PTR: 78-128.206.104.serverhubrdns.in-addr.arpa.
2020-02-11 17:37:57
106.53.88.247 attackspambots
Feb 10 23:08:57 hpm sshd\[25412\]: Invalid user uaj from 106.53.88.247
Feb 10 23:08:57 hpm sshd\[25412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.88.247
Feb 10 23:08:59 hpm sshd\[25412\]: Failed password for invalid user uaj from 106.53.88.247 port 46552 ssh2
Feb 10 23:12:39 hpm sshd\[25951\]: Invalid user rlo from 106.53.88.247
Feb 10 23:12:39 hpm sshd\[25951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.88.247
2020-02-11 17:29:19
103.28.52.84 attackbotsspam
Feb 11 10:20:17 silence02 sshd[6946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.52.84
Feb 11 10:20:19 silence02 sshd[6946]: Failed password for invalid user gwu from 103.28.52.84 port 37862 ssh2
Feb 11 10:23:27 silence02 sshd[7252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.52.84
2020-02-11 17:32:36
89.248.172.16 attackbots
Unauthorized connection attempt detected from IP address 89.248.172.16 to port 3559
2020-02-11 17:58:24
209.17.97.114 attackbots
Automatic report - Banned IP Access
2020-02-11 17:27:00
27.74.243.201 attackspam
Unauthorized connection attempt from IP address 27.74.243.201 on Port 445(SMB)
2020-02-11 17:34:40
138.36.4.81 attack
DATE:2020-02-11 05:50:29, IP:138.36.4.81, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-02-11 18:06:28
111.59.93.76 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-02-11 17:35:01
150.109.63.204 attackspam
Automatic report - SSH Brute-Force Attack
2020-02-11 17:46:13
60.28.131.10 attackspambots
Brute force attempt
2020-02-11 17:39:55

Recently Reported IPs

185.104.45.123 185.104.30.143 185.104.45.103 185.104.45.105
185.104.45.133 185.104.45.121 185.104.45.163 185.104.45.199
185.104.45.141 185.104.45.167 185.104.45.23 185.104.45.25
185.104.45.145 185.104.45.155 185.104.45.26 185.104.45.21
185.104.45.29 185.104.45.31 185.104.45.160 185.104.45.39