Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.139.84.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.139.84.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 21:45:08 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 103.84.139.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.84.139.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.120.176 attack
Nov  1 12:00:41 firewall sshd[1695]: Invalid user com from 106.13.120.176
Nov  1 12:00:43 firewall sshd[1695]: Failed password for invalid user com from 106.13.120.176 port 59336 ssh2
Nov  1 12:07:03 firewall sshd[1781]: Invalid user abcdefghij from 106.13.120.176
...
2019-11-02 03:56:05
78.128.113.120 attack
2019-11-01T19:15:04.564696beta postfix/smtpd[21213]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed: authentication failure
2019-11-01T19:15:07.855003beta postfix/smtpd[21213]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed: authentication failure
2019-11-01T19:19:05.493339beta postfix/smtpd[21263]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed: authentication failure
...
2019-11-02 03:24:12
140.143.164.33 attack
Nov  1 12:44:17 srv206 sshd[10926]: Invalid user password321 from 140.143.164.33
...
2019-11-02 03:53:43
139.155.26.91 attack
Nov  1 14:38:59 server sshd\[1128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.91  user=root
Nov  1 14:39:01 server sshd\[1128\]: Failed password for root from 139.155.26.91 port 41232 ssh2
Nov  1 14:44:15 server sshd\[2282\]: Invalid user fk from 139.155.26.91
Nov  1 14:44:15 server sshd\[2282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.91 
Nov  1 14:44:17 server sshd\[2282\]: Failed password for invalid user fk from 139.155.26.91 port 48216 ssh2
...
2019-11-02 03:52:32
85.51.149.32 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/85.51.149.32/ 
 
 ES - 1H : (66)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN12479 
 
 IP : 85.51.149.32 
 
 CIDR : 85.51.148.0/22 
 
 PREFIX COUNT : 6057 
 
 UNIQUE IP COUNT : 6648832 
 
 
 ATTACKS DETECTED ASN12479 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 4 
 24H - 7 
 
 DateTime : 2019-11-01 12:44:41 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-02 03:38:37
94.233.225.90 attackspam
Chat Spam
2019-11-02 03:44:16
73.22.54.40 attackspambots
SSH-bruteforce attempts
2019-11-02 03:43:37
119.42.72.57 attackspambots
Unauthorised access (Nov  1) SRC=119.42.72.57 LEN=52 TTL=114 ID=4071 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-02 03:48:52
51.91.48.22 attackspambots
Nov  1 20:56:00 master sshd[25806]: Did not receive identification string from 51.91.48.22
Nov  1 20:57:39 master sshd[25807]: Failed password for root from 51.91.48.22 port 56296 ssh2
Nov  1 20:57:51 master sshd[25809]: Failed password for invalid user root123 from 51.91.48.22 port 59482 ssh2
Nov  1 20:58:05 master sshd[25811]: Failed password for root from 51.91.48.22 port 34332 ssh2
Nov  1 20:58:19 master sshd[25813]: Failed password for root from 51.91.48.22 port 37514 ssh2
Nov  1 20:58:33 master sshd[25815]: Failed password for root from 51.91.48.22 port 40590 ssh2
Nov  1 20:58:48 master sshd[25819]: Failed password for root from 51.91.48.22 port 43720 ssh2
Nov  1 20:59:04 master sshd[25821]: Failed password for root from 51.91.48.22 port 46866 ssh2
Nov  1 20:59:20 master sshd[25823]: Failed password for root from 51.91.48.22 port 50016 ssh2
Nov  1 20:59:35 master sshd[25825]: Failed password for root from 51.91.48.22 port 53144 ssh2
Nov  1 20:59:51 master sshd[25827]: Failed password for root from 51.91
2019-11-02 03:34:11
114.242.245.251 attackbots
$f2bV_matches
2019-11-02 03:45:18
45.171.151.26 attack
Unauthorized connection attempt from IP address 45.171.151.26 on Port 445(SMB)
2019-11-02 03:24:56
145.239.116.170 attack
Oct 30 10:23:56 reporting sshd[31041]: Invalid user download from 145.239.116.170
Oct 30 10:23:56 reporting sshd[31041]: Failed password for invalid user download from 145.239.116.170 port 57730 ssh2
Oct 30 10:28:28 reporting sshd[918]: Invalid user tester from 145.239.116.170
Oct 30 10:28:28 reporting sshd[918]: Failed password for invalid user tester from 145.239.116.170 port 48614 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=145.239.116.170
2019-11-02 03:53:24
220.130.10.13 attack
Nov  1 20:00:37 lnxded64 sshd[25517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13
2019-11-02 03:49:34
92.210.101.33 attackspam
Nov  1 13:43:40 thevastnessof sshd[25881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.210.101.33
...
2019-11-02 03:36:31
95.181.177.88 attack
Automatic report - Banned IP Access
2019-11-02 03:53:07

Recently Reported IPs

215.248.186.30 95.4.120.241 197.95.115.92 78.171.181.239
191.202.209.80 95.156.241.219 200.116.100.245 147.40.78.254
176.206.165.0 172.192.240.133 208.136.244.243 200.232.204.104
9.26.120.181 79.127.184.113 21.230.41.196 141.218.154.206
57.186.154.179 73.102.195.157 19.127.242.125 35.162.155.9