Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Edison

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.102.129.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.102.129.165.		IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 30 14:09:47 CST 2022
;; MSG SIZE  rcvd: 108
Host info
165.129.102.104.in-addr.arpa domain name pointer a104-102-129-165.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
165.129.102.104.in-addr.arpa	name = a104-102-129-165.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.204.157.197 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-12-24 20:21:02
196.219.85.212 attack
Unauthorized connection attempt from IP address 196.219.85.212 on Port 445(SMB)
2019-12-24 20:00:52
140.143.2.228 attackspam
Dec 24 12:40:26 51-15-180-239 sshd[21016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.2.228  user=root
Dec 24 12:40:28 51-15-180-239 sshd[21016]: Failed password for root from 140.143.2.228 port 44092 ssh2
...
2019-12-24 20:24:35
36.89.234.161 attack
Unauthorized connection attempt from IP address 36.89.234.161 on Port 445(SMB)
2019-12-24 20:30:53
1.55.18.211 attack
Unauthorized connection attempt from IP address 1.55.18.211 on Port 445(SMB)
2019-12-24 19:56:10
213.247.196.249 attack
[portscan] Port scan
2019-12-24 20:29:25
58.56.32.238 attackbots
Dec 24 08:46:11 tuxlinux sshd[57432]: Invalid user ami from 58.56.32.238 port 7902
Dec 24 08:46:11 tuxlinux sshd[57432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238 
Dec 24 08:46:11 tuxlinux sshd[57432]: Invalid user ami from 58.56.32.238 port 7902
Dec 24 08:46:11 tuxlinux sshd[57432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238 
...
2019-12-24 19:53:00
114.5.218.12 attackbots
Unauthorized connection attempt detected from IP address 114.5.218.12 to port 445
2019-12-24 20:32:11
103.62.235.221 attack
Unauthorized connection attempt detected from IP address 103.62.235.221 to port 445
2019-12-24 20:31:12
171.244.175.178 attack
Unauthorized connection attempt detected from IP address 171.244.175.178 to port 445
2019-12-24 20:03:39
164.163.2.4 attackspambots
Dec 24 09:31:58 cavern sshd[16668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.2.4
2019-12-24 20:28:02
139.199.58.118 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-12-24 20:26:53
222.186.175.155 attackbots
--- report ---
Dec 24 08:45:51 sshd: Connection from 222.186.175.155 port 46092
Dec 24 08:45:54 sshd: Failed password for root from 222.186.175.155 port 46092 ssh2
Dec 24 08:45:56 sshd: Received disconnect from 222.186.175.155: 11:  [preauth]
2019-12-24 20:06:07
212.92.105.127 attackspam
24.12.2019 08:15:45 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-12-24 20:20:15
195.223.211.242 attackspam
Dec 24 12:50:28 icinga sshd[2860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
Dec 24 12:50:30 icinga sshd[2860]: Failed password for invalid user navarrette from 195.223.211.242 port 50708 ssh2
...
2019-12-24 19:57:04

Recently Reported IPs

103.98.237.111 104.104.70.164 104.105.32.73 104.106.235.110
104.107.20.15 104.107.23.84 253.186.216.61 104.107.24.245
104.107.26.187 104.109.157.99 104.112.235.128 104.112.235.83
104.114.72.82 104.126.112.122 104.127.73.172 104.127.77.63
104.128.39.235 104.129.171.196 104.131.1.12 104.144.145.8