Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.145.121.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8876
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.145.121.105.			IN	A

;; AUTHORITY SECTION:
.			498	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:28:55 CST 2022
;; MSG SIZE  rcvd: 106
Host info
105.121.145.3.in-addr.arpa domain name pointer ec2-3-145-121-105.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.121.145.3.in-addr.arpa	name = ec2-3-145-121-105.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.79.44.100 attackbotsspam
Automatic report - Banned IP Access
2020-06-03 03:41:14
185.85.191.196 attackspam
Automatic report - Banned IP Access
2020-06-03 03:34:57
90.143.153.8 attack
IP 90.143.153.8 attacked honeypot on port: 5000 at 6/2/2020 1:00:36 PM
2020-06-03 03:36:00
201.124.121.47 attackbots
Unauthorized connection attempt from IP address 201.124.121.47 on Port 445(SMB)
2020-06-03 03:24:59
190.78.33.34 attackspambots
Unauthorized connection attempt from IP address 190.78.33.34 on Port 445(SMB)
2020-06-03 03:29:31
81.198.255.22 attackspam
Automatic report - XMLRPC Attack
2020-06-03 03:21:57
103.150.242.34 attackspam
FTP/21 MH Probe, BF, Hack -
2020-06-03 03:18:49
121.225.17.202 attack
(ftpd) Failed FTP login from 121.225.17.202 (CN/China/202.17.225.121.broad.nj.js.dynamic.163data.com.cn): 10 in the last 3600 secs
2020-06-03 03:19:21
88.202.190.142 attackspambots
 TCP (SYN) 88.202.190.142:7443 -> port 7443, len 44
2020-06-03 03:12:09
157.245.237.33 attackbotsspam
Jun  2 20:42:04 10.23.102.36 sshd[15668]: Failed password for root from 157.245.237.33 port 55916 ssh2
Jun  2 20:42:04 10.23.102.36 sshd[15668]: Disconnected from 157.245.237.33 port 55916 [preauth]
...
2020-06-03 03:15:36
184.105.247.220 attack
 TCP (SYN) 184.105.247.220:38818 -> port 7547, len 44
2020-06-03 03:44:37
111.229.33.187 attackspambots
DATE:2020-06-02 15:03:08,IP:111.229.33.187,MATCHES:10,PORT:ssh
2020-06-03 03:11:13
92.222.92.114 attackbots
Jun  2 20:41:59 vmd48417 sshd[22776]: Failed password for root from 92.222.92.114 port 55050 ssh2
2020-06-03 03:15:24
185.176.27.46 attack
Scanned 236 unique addresses for 4521 unique ports in 24 hours
2020-06-03 03:37:02
101.69.53.221 attackspambots
Jun  2 14:00:43 debian-2gb-nbg1-2 kernel: \[13358011.046381\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=101.69.53.221 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=6094 PROTO=TCP SPT=47381 DPT=23 WINDOW=15460 RES=0x00 SYN URGP=0
2020-06-03 03:33:26

Recently Reported IPs

97.120.216.112 193.57.40.28 201.156.22.250 176.32.184.238
118.195.144.172 188.130.139.178 192.241.203.119 190.2.132.207
115.127.24.93 34.69.148.77 185.220.103.114 188.52.7.210
191.240.112.223 176.121.254.60 125.43.207.190 88.204.184.34
88.217.72.12 118.179.60.62 171.39.0.3 106.12.105.161