Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.104.45.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.104.45.49.			IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022701 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 05:14:44 CST 2020
;; MSG SIZE  rcvd: 115
Host info
49.45.104.3.in-addr.arpa domain name pointer ec2-3-104-45-49.ap-southeast-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.45.104.3.in-addr.arpa	name = ec2-3-104-45-49.ap-southeast-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.230.73.40 attackbots
23/tcp 23/tcp
[2020-09-30/10-02]2pkt
2020-10-03 15:32:31
81.70.49.111 attackbots
Invalid user lisa from 81.70.49.111 port 51048
2020-10-03 16:01:23
24.48.223.22 attack
55101/udp
[2020-10-02]1pkt
2020-10-03 16:03:07
193.203.11.32 attackspambots
(mod_security) mod_security (id:210730) triggered by 193.203.11.32 (RU/Russia/-): 5 in the last 300 secs
2020-10-03 15:19:27
185.250.44.11 attack
(mod_security) mod_security (id:210730) triggered by 185.250.44.11 (RU/Russia/-): 5 in the last 300 secs
2020-10-03 15:31:24
180.167.240.210 attack
$f2bV_matches
2020-10-03 15:57:17
45.186.248.135 attackspam
Invalid user wocloud from 45.186.248.135 port 64665
2020-10-03 16:02:34
43.226.148.89 attack
$f2bV_matches
2020-10-03 15:35:09
92.55.189.115 attackbots
445/tcp 445/tcp
[2020-10-02]2pkt
2020-10-03 15:58:38
193.124.59.213 attackbotsspam
Oct  3 07:00:06 *** sshd[25566]: Did not receive identification string from 193.124.59.213
2020-10-03 16:00:19
207.154.229.50 attack
SSH login attempts.
2020-10-03 15:20:53
106.54.112.173 attackbots
SSHD brute force attack detected from [106.54.112.173]
2020-10-03 15:41:25
112.249.40.18 attackspambots
Port probing on unauthorized port 5501
2020-10-03 15:46:13
2401:c080:1400:429f:5400:2ff:fef0:2086 attack
Oct  2 22:38:33 10.23.102.230 wordpress(www.ruhnke.cloud)[17290]: XML-RPC authentication attempt for unknown user [login] from 2401:c080:1400:429f:5400:2ff:fef0:2086
...
2020-10-03 15:44:29
89.160.186.180 attack
55101/udp
[2020-10-02]1pkt
2020-10-03 15:54:42

Recently Reported IPs

14.250.220.211 114.188.187.120 14.174.122.16 193.116.86.174
5.22.129.103 121.160.166.219 213.89.66.67 14.169.214.29
187.251.240.3 106.79.64.180 200.89.178.197 150.116.194.183
223.68.207.132 69.168.252.55 58.158.26.111 104.173.129.227
73.229.179.239 142.197.10.129 70.146.133.231 14.161.28.131