Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.102.125.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51914
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.102.125.45.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:01:51 CST 2022
;; MSG SIZE  rcvd: 107
Host info
45.125.102.104.in-addr.arpa domain name pointer a104-102-125-45.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.125.102.104.in-addr.arpa	name = a104-102-125-45.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
174.53.37.247 attackspambots
Repeated brute force against a port
2019-07-08 08:04:56
221.160.100.14 attack
Jul  8 00:13:26 marvibiene sshd[21521]: Invalid user admin from 221.160.100.14 port 42116
Jul  8 00:13:26 marvibiene sshd[21521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14
Jul  8 00:13:26 marvibiene sshd[21521]: Invalid user admin from 221.160.100.14 port 42116
Jul  8 00:13:27 marvibiene sshd[21521]: Failed password for invalid user admin from 221.160.100.14 port 42116 ssh2
...
2019-07-08 08:31:44
147.135.195.254 attackbotsspam
SSH Brute Force, server-1 sshd[2143]: Failed password for invalid user testuser from 147.135.195.254 port 58054 ssh2
2019-07-08 08:08:35
82.135.30.41 attackbots
Many RDP login attempts detected by IDS script
2019-07-08 08:09:30
36.66.4.62 attackbotsspam
SSH Server BruteForce Attack
2019-07-08 08:24:31
103.99.3.89 attack
Jul  8 06:11:04 lcl-usvr-01 sshd[19340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.3.89  user=root
Jul  8 06:11:07 lcl-usvr-01 sshd[19377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.3.89 
Jul  8 06:11:10 lcl-usvr-01 sshd[19397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.3.89
2019-07-08 08:31:10
51.77.242.176 attackbotsspam
web exploits
...
2019-07-08 08:27:57
176.60.208.60 attackbotsspam
proto=tcp  .  spt=33712  .  dpt=25  .     (listed on Blocklist de  Jul 07)     (14)
2019-07-08 07:59:49
142.93.39.29 attackbots
2019-07-08T07:01:44.824774enmeeting.mahidol.ac.th sshd\[22197\]: User root from 142.93.39.29 not allowed because not listed in AllowUsers
2019-07-08T07:01:44.947597enmeeting.mahidol.ac.th sshd\[22197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.39.29  user=root
2019-07-08T07:01:47.776939enmeeting.mahidol.ac.th sshd\[22197\]: Failed password for invalid user root from 142.93.39.29 port 53338 ssh2
...
2019-07-08 08:42:18
141.98.80.31 attackbots
2019-07-08T06:11:39.790975enmeeting.mahidol.ac.th sshd\[22016\]: Invalid user admin from 141.98.80.31 port 36390
2019-07-08T06:11:39.805071enmeeting.mahidol.ac.th sshd\[22016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.31
2019-07-08T06:11:41.435070enmeeting.mahidol.ac.th sshd\[22016\]: Failed password for invalid user admin from 141.98.80.31 port 36390 ssh2
...
2019-07-08 08:47:42
80.49.151.121 attackspam
SSH Brute Force
2019-07-08 08:22:01
34.83.153.11 attackbots
(From hayden.laroche@hotmail.com) Hello
  
YOU WANT LIVE BUT EXPIRED DOMAINS That Are Still Posted On Wikipedia And Youtube ?
 
Can you imagine how powerful it is to  be able to pick up an expired domain that is still posted below a YouTube video that is getting hundreds or even thousands of views per day?
Or be able to pick up an expired domain that still has a live link from Wikipedia?
 
MyTrafficJacker allows users to search by keyword on either Wikipedia and YouTube and 
find live but expired links that are still posted on these sites that you can pick up for as little as $10 and 
redirect that traffic and authority anywhere they’d like.

NOW GET TRAFFIC and SALES in as little as 24 hours: without having to make or rank any videos, 
without having to create a website, without having to pay a dime for traffic...
  
IF YOU ARE INTERESTED, CONTACT US ==>  sayedasaliha748@gmail.com
 
Once you Join TODAY, You'll Also GET AMAZING BONUSES
 
Regards,
TrafficJacker
2019-07-08 08:41:11
45.118.60.44 attackbotsspam
TCP Port: 25 _    invalid blocked abuseat-org zen-spamhaus _  _  _ _ (6)
2019-07-08 08:18:20
105.155.251.209 attackspambots
Many RDP login attempts detected by IDS script
2019-07-08 08:24:46
85.122.83.105 attack
85.122.83.105 - - \[08/Jul/2019:01:12:08 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
85.122.83.105 - - \[08/Jul/2019:01:12:11 +0200\] "POST /wp-login.php HTTP/1.1" 200 2096 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-07-08 08:32:18

Recently Reported IPs

104.102.252.6 104.102.121.149 104.102.251.152 104.102.251.195
104.104.96.28 104.104.104.115 104.22.13.196 104.104.97.245
104.105.36.136 104.105.36.206 104.105.36.83 104.105.37.133
104.105.34.214 104.105.82.206 104.105.83.72 104.105.82.73
104.105.43.252 104.105.91.178 104.105.84.93 104.22.13.210