Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Edison

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.102.132.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.102.132.81.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052401 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 25 03:32:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
81.132.102.104.in-addr.arpa domain name pointer a104-102-132-81.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.132.102.104.in-addr.arpa	name = a104-102-132-81.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.114.177.237 attackbotsspam
attempted connection to port 1433
2020-03-05 03:02:38
92.63.194.22 attack
SSH bruteforce
2020-03-05 02:44:30
62.110.7.211 attack
Honeypot attack, port: 81, PTR: mail.fitre.it.
2020-03-05 02:40:27
125.59.209.176 attackbots
Honeypot attack, port: 5555, PTR: cm125-59-209-176.hkcable.com.hk.
2020-03-05 02:29:36
66.231.92.97 attack
TCP Port: 25      invalid blocked  spam-sorbs also spamrats           (306)
2020-03-05 02:32:40
219.159.239.77 attackspambots
$f2bV_matches
2020-03-05 02:48:33
117.3.142.15 attack
attempted connection to port 9530
2020-03-05 03:04:38
23.160.192.247 attack
tcp 11211
2020-03-05 02:44:58
3.1.201.108 attack
attempted connection to port 9200
2020-03-05 02:43:46
27.74.253.153 attack
1583328855 - 03/04/2020 14:34:15 Host: 27.74.253.153/27.74.253.153 Port: 445 TCP Blocked
2020-03-05 02:29:57
3.95.153.54 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/3.95.153.54/ 
 
 US - 1H : (128)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN14618 
 
 IP : 3.95.153.54 
 
 CIDR : 3.80.0.0/12 
 
 PREFIX COUNT : 433 
 
 UNIQUE IP COUNT : 19526400 
 
 
 ATTACKS DETECTED ASN14618 :  
  1H - 4 
  3H - 6 
  6H - 14 
 12H - 18 
 24H - 18 
 
 DateTime : 2020-03-04 14:34:17 
 
 INFO : DNS DENIED Scan Detected and Blocked by ADMIN  - data recovery
2020-03-05 02:27:03
219.84.236.108 attackspam
$f2bV_matches
2020-03-05 02:32:06
218.92.0.145 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Failed password for root from 218.92.0.145 port 13799 ssh2
Failed password for root from 218.92.0.145 port 13799 ssh2
Failed password for root from 218.92.0.145 port 13799 ssh2
Failed password for root from 218.92.0.145 port 13799 ssh2
2020-03-05 02:26:17
121.144.71.40 attack
attempted connection to port 23
2020-03-05 03:03:01
114.80.178.221 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-03-05 03:06:05

Recently Reported IPs

104.102.132.61 104.102.132.94 104.102.133.10 104.102.133.113
104.102.133.173 104.102.133.3 104.102.134.148 104.102.134.185
104.102.134.50 104.102.135.104 104.102.135.13 104.102.135.156
104.102.136.164 104.102.136.199 104.102.136.64 104.102.136.72
104.102.136.92 104.102.137.12 104.102.137.155 104.102.138.148