Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.146.234.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.146.234.104.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 03:46:49 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 104.234.146.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.234.146.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.109.11.162 attack
SS5,WP GET /wp-login.php
2020-06-06 17:27:22
113.197.54.162 attackbotsspam
Unauthorized connection attempt from IP address 113.197.54.162 on Port 445(SMB)
2020-06-06 17:53:14
60.250.244.210 attack
Jun  6 06:58:43 melroy-server sshd[1627]: Failed password for root from 60.250.244.210 port 47648 ssh2
...
2020-06-06 18:00:43
36.237.236.149 attackbots
port scan and connect, tcp 23 (telnet)
2020-06-06 17:40:17
183.15.181.67 attackspam
Jun  6 07:29:34 tuxlinux sshd[24825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.181.67  user=root
Jun  6 07:29:36 tuxlinux sshd[24825]: Failed password for root from 183.15.181.67 port 37810 ssh2
Jun  6 07:29:34 tuxlinux sshd[24825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.181.67  user=root
Jun  6 07:29:36 tuxlinux sshd[24825]: Failed password for root from 183.15.181.67 port 37810 ssh2
Jun  6 08:17:14 tuxlinux sshd[31778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.181.67  user=root
...
2020-06-06 17:36:16
189.126.219.218 attackbotsspam
Unauthorized connection attempt from IP address 189.126.219.218 on Port 445(SMB)
2020-06-06 17:39:18
125.19.208.6 attack
Unauthorized connection attempt from IP address 125.19.208.6 on Port 445(SMB)
2020-06-06 17:58:24
118.24.89.27 attackspambots
prod11
...
2020-06-06 18:01:58
40.120.54.164 attackbotsspam
Jun  6 12:37:52 server2 sshd\[12596\]: User root from 40.120.54.164 not allowed because not listed in AllowUsers
Jun  6 12:37:52 server2 sshd\[12598\]: Invalid user admin from 40.120.54.164
Jun  6 12:37:52 server2 sshd\[12600\]: Invalid user admin from 40.120.54.164
Jun  6 12:37:52 server2 sshd\[12602\]: Invalid user user from 40.120.54.164
Jun  6 12:37:52 server2 sshd\[12604\]: Invalid user ubnt from 40.120.54.164
Jun  6 12:37:53 server2 sshd\[12606\]: Invalid user admin from 40.120.54.164
2020-06-06 17:56:29
180.76.104.167 attackbotsspam
" "
2020-06-06 17:57:25
49.68.225.36 attackspam
/HNAP1/
2020-06-06 18:01:09
193.35.48.18 attack
Jun  6 11:42:33 inter-technics postfix/smtpd[30278]: warning: unknown[193.35.48.18]: SASL LOGIN authentication failed: authentication failure
Jun  6 11:42:35 inter-technics postfix/smtpd[30278]: warning: unknown[193.35.48.18]: SASL LOGIN authentication failed: authentication failure
Jun  6 11:49:44 inter-technics postfix/smtpd[30799]: warning: unknown[193.35.48.18]: SASL LOGIN authentication failed: authentication failure
...
2020-06-06 17:50:52
5.188.86.165 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-06T07:40:15Z and 2020-06-06T07:53:21Z
2020-06-06 17:41:36
5.235.153.72 attackbots
Unauthorized connection attempt from IP address 5.235.153.72 on Port 445(SMB)
2020-06-06 18:09:49
27.72.104.121 attackbotsspam
Unauthorized connection attempt from IP address 27.72.104.121 on Port 445(SMB)
2020-06-06 18:02:47

Recently Reported IPs

161.61.53.229 206.111.20.218 189.234.70.21 220.150.140.169
242.140.208.31 173.114.60.17 177.52.23.245 32.56.180.114
26.18.105.153 177.60.121.118 177.155.115.55 181.217.5.100
140.195.221.54 70.195.198.114 247.73.228.67 243.171.45.148
216.182.254.253 178.227.190.170 4.183.233.52 55.27.57.146