Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.245.109.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.245.109.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 01:33:08 CST 2025
;; MSG SIZE  rcvd: 105
Host info
5.109.245.44.in-addr.arpa domain name pointer ec2-44-245-109-5.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.109.245.44.in-addr.arpa	name = ec2-44-245-109-5.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.68.121.235 attackspam
SSH brute-force attempt
2020-07-17 04:57:23
84.54.12.235 attackspambots
Wood Working ideas  Cheap and Easy to Build.
2020-07-17 05:31:51
106.12.38.231 attack
Jul 16 20:58:05 ip-172-31-62-245 sshd\[25135\]: Invalid user utente1 from 106.12.38.231\
Jul 16 20:58:07 ip-172-31-62-245 sshd\[25135\]: Failed password for invalid user utente1 from 106.12.38.231 port 33020 ssh2\
Jul 16 21:02:47 ip-172-31-62-245 sshd\[25204\]: Invalid user ftp_id from 106.12.38.231\
Jul 16 21:02:48 ip-172-31-62-245 sshd\[25204\]: Failed password for invalid user ftp_id from 106.12.38.231 port 38174 ssh2\
Jul 16 21:07:20 ip-172-31-62-245 sshd\[25293\]: Invalid user pascual from 106.12.38.231\
2020-07-17 05:25:36
156.146.50.198 attack
(From sam.fallegeros@businesspromoted.live) cactusflowerwc.com is currently receiving  211  clicks from organic traffic. However, your competition is crushing it  You can view detailed traffic analysis at  https://www.spyfu.com/overview/domain?query=cactusflowerwc.com

211  clicks are certainly not enough. We can certainly do better! We need to do better. It is not that difficult. With in-depth keyword research and on-page optimization it is doable. We will reverse engineer competitor's link building strategies and get the links from similar sources. 

Its perfect time to plan your marketing strategy. You have created good website but your site will not rank in Google until content and images are  optimized correctly. We need to optimize your website for search engines and make it search engine friendly. 

I have analyzed your site in-depth and you can view your website audit report at

https://businesspromoted.websiteauditserver.com/cactusflowerwc.com

Your website is the reflection of your busines
2020-07-17 05:10:23
128.199.199.159 attack
Jul 16 15:34:12 v22019038103785759 sshd\[3104\]: Invalid user pk from 128.199.199.159 port 38354
Jul 16 15:34:12 v22019038103785759 sshd\[3104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.199.159
Jul 16 15:34:14 v22019038103785759 sshd\[3104\]: Failed password for invalid user pk from 128.199.199.159 port 38354 ssh2
Jul 16 15:43:27 v22019038103785759 sshd\[3602\]: Invalid user jenkins from 128.199.199.159 port 54772
Jul 16 15:43:27 v22019038103785759 sshd\[3602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.199.159
...
2020-07-17 05:19:29
84.54.12.236 attackbots
Drink this, Drop 10 Sizes From your waist
2020-07-17 04:55:59
52.142.62.1 attackbotsspam
Cluster member 67.227.229.95 (US/United States/host.cjthedj97.me) said, DENY 52.142.62.1, Reason:[(sshd) Failed SSH login from 52.142.62.1 (US/United States/-): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER
2020-07-17 05:32:54
185.176.27.42 attackspam
07/16/2020-17:07:27.640417 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-17 05:14:26
163.53.83.89 attackspambots
port scan and connect, tcp 23 (telnet)
2020-07-17 04:57:03
61.177.172.54 attackspambots
Jul 16 23:06:35 OPSO sshd\[12843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54  user=root
Jul 16 23:06:37 OPSO sshd\[12843\]: Failed password for root from 61.177.172.54 port 9725 ssh2
Jul 16 23:06:40 OPSO sshd\[12843\]: Failed password for root from 61.177.172.54 port 9725 ssh2
Jul 16 23:06:43 OPSO sshd\[12843\]: Failed password for root from 61.177.172.54 port 9725 ssh2
Jul 16 23:06:46 OPSO sshd\[12843\]: Failed password for root from 61.177.172.54 port 9725 ssh2
2020-07-17 05:09:03
192.99.168.9 attack
SSHD brute force attack detected by fail2ban
2020-07-17 05:29:31
189.112.147.1 attack
Scan and connect port 5432 postgresql
2020-07-17 05:11:53
212.252.106.196 attackbots
Jul 16 19:58:03 lnxded64 sshd[8922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.252.106.196
2020-07-17 05:09:55
181.55.188.218 attack
Jul 16 18:08:11 sigma sshd\[24330\]: Invalid user utente from 181.55.188.218Jul 16 18:08:13 sigma sshd\[24330\]: Failed password for invalid user utente from 181.55.188.218 port 52750 ssh2
...
2020-07-17 05:07:28
13.68.255.9 attack
Jul 16 17:59:06 ns382633 sshd\[3590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.255.9  user=root
Jul 16 17:59:09 ns382633 sshd\[3590\]: Failed password for root from 13.68.255.9 port 20421 ssh2
Jul 16 18:53:44 ns382633 sshd\[14276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.255.9  user=root
Jul 16 18:53:46 ns382633 sshd\[14276\]: Failed password for root from 13.68.255.9 port 35617 ssh2
Jul 16 18:57:13 ns382633 sshd\[15059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.255.9  user=root
2020-07-17 05:22:21

Recently Reported IPs

70.134.163.78 185.37.243.234 190.190.61.130 47.30.0.127
166.108.143.29 205.238.162.86 47.252.135.71 219.131.32.174
138.145.162.186 237.17.111.165 109.45.231.27 231.247.235.62
114.229.62.59 160.43.38.252 239.187.86.38 248.166.219.253
15.230.228.31 36.88.155.176 139.149.239.244 6.85.85.10