Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.1.104.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12801
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.1.104.245.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022121300 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 13 20:45:05 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 245.104.1.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.104.1.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
154.92.130.234 attack
Nov 22 10:49:43 www sshd\[170676\]: Invalid user smmsp from 154.92.130.234
Nov 22 10:49:43 www sshd\[170676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.130.234
Nov 22 10:49:46 www sshd\[170676\]: Failed password for invalid user smmsp from 154.92.130.234 port 37306 ssh2
...
2019-11-22 16:58:42
206.189.149.9 attackspambots
Invalid user midtsund from 206.189.149.9 port 48374
2019-11-22 16:22:33
78.46.63.108 attackbots
20 attempts against mh-misbehave-ban on pine.magehost.pro
2019-11-22 16:29:06
66.70.240.214 attack
masscan/1.0 (https://github.com/robertdavidgraham/masscan)
2019-11-22 16:50:40
45.224.209.73 attackbots
Automatic report - Port Scan Attack
2019-11-22 17:03:43
159.203.201.242 attackbots
" "
2019-11-22 16:27:22
129.211.35.94 attack
fail2ban honeypot
2019-11-22 16:42:24
180.124.29.70 attackbots
Telnetd brute force attack detected by fail2ban
2019-11-22 16:39:39
201.177.69.125 attackbotsspam
" "
2019-11-22 16:47:48
198.27.90.106 attackbots
Nov 22 07:26:14 dedicated sshd[14971]: Invalid user sundsvold from 198.27.90.106 port 57668
2019-11-22 16:57:29
196.216.206.2 attackbotsspam
Nov 22 05:01:24 firewall sshd[28025]: Invalid user mohanraj from 196.216.206.2
Nov 22 05:01:26 firewall sshd[28025]: Failed password for invalid user mohanraj from 196.216.206.2 port 36734 ssh2
Nov 22 05:05:48 firewall sshd[28101]: Invalid user 123456 from 196.216.206.2
...
2019-11-22 16:46:19
222.186.19.221 attack
Fail2Ban Ban Triggered
2019-11-22 16:44:32
89.250.214.106 attackbots
[portscan] Port scan
2019-11-22 16:26:30
178.156.202.190 attack
HTTP: ChinaChopper Checkin 2
2019-11-22 16:43:47
159.203.123.196 attack
2019-11-22T07:27:32.191091hub.schaetter.us sshd\[10141\]: Invalid user marshala from 159.203.123.196 port 36838
2019-11-22T07:27:32.204178hub.schaetter.us sshd\[10141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.123.196
2019-11-22T07:27:33.885211hub.schaetter.us sshd\[10141\]: Failed password for invalid user marshala from 159.203.123.196 port 36838 ssh2
2019-11-22T07:31:01.506746hub.schaetter.us sshd\[10151\]: Invalid user backup from 159.203.123.196 port 44066
2019-11-22T07:31:01.526896hub.schaetter.us sshd\[10151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.123.196
...
2019-11-22 16:24:34

Recently Reported IPs

195.254.119.113 193.47.89.28 78.231.5.151 18.62.198.123
101.33.231.51 211.52.87.246 14.212.243.159 15.134.99.231
152.89.196.220 128.152.224.16 178.159.233.186 58.44.78.103
117.197.69.157 114.170.235.55 113.162.163.84 103.217.36.234
102.32.117.163 51.75.21.43 87.146.105.20 67.202.20.22