Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.104.58.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.104.58.4.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020122000 1800 900 604800 86400

;; Query time: 196 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 21 00:51:28 CST 2020
;; MSG SIZE  rcvd: 116
Host info
4.58.104.104.in-addr.arpa domain name pointer a104-104-58-4.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.58.104.104.in-addr.arpa	name = a104-104-58-4.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.172.64 attack
Mar 28 05:43:55 host01 sshd[17313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64 
Mar 28 05:43:57 host01 sshd[17313]: Failed password for invalid user ts3bot from 142.93.172.64 port 52006 ssh2
Mar 28 05:48:43 host01 sshd[18079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64 
...
2020-03-28 12:54:29
64.225.99.7 attackbotsspam
Mar 28 04:50:03 ovpn sshd\[27117\]: Invalid user jrx from 64.225.99.7
Mar 28 04:50:03 ovpn sshd\[27117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.99.7
Mar 28 04:50:05 ovpn sshd\[27117\]: Failed password for invalid user jrx from 64.225.99.7 port 37696 ssh2
Mar 28 04:54:36 ovpn sshd\[28170\]: Invalid user zanron from 64.225.99.7
Mar 28 04:54:36 ovpn sshd\[28170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.99.7
2020-03-28 12:57:37
80.82.77.240 attackspambots
Mar 28 04:54:10 debian-2gb-nbg1-2 kernel: \[7626718.261314\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.240 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=40881 PROTO=TCP SPT=64344 DPT=1080 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-28 13:14:55
92.118.38.50 attack
Mar 28 04:47:14 blackbee postfix/smtpd\[27398\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: authentication failure
Mar 28 04:47:41 blackbee postfix/smtpd\[27391\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: authentication failure
Mar 28 04:48:09 blackbee postfix/smtpd\[27398\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: authentication failure
Mar 28 04:48:36 blackbee postfix/smtpd\[27391\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: authentication failure
Mar 28 04:49:03 blackbee postfix/smtpd\[27389\]: warning: unknown\[92.118.38.50\]: SASL LOGIN authentication failed: authentication failure
...
2020-03-28 12:50:19
152.136.114.118 attack
2020-03-28T05:54:41.991854vps773228.ovh.net sshd[19279]: Failed password for invalid user aqo from 152.136.114.118 port 58352 ssh2
2020-03-28T05:57:31.675664vps773228.ovh.net sshd[20384]: Invalid user nfm from 152.136.114.118 port 45800
2020-03-28T05:57:31.690279vps773228.ovh.net sshd[20384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.114.118
2020-03-28T05:57:31.675664vps773228.ovh.net sshd[20384]: Invalid user nfm from 152.136.114.118 port 45800
2020-03-28T05:57:33.686766vps773228.ovh.net sshd[20384]: Failed password for invalid user nfm from 152.136.114.118 port 45800 ssh2
...
2020-03-28 12:59:05
69.163.162.211 attackspam
DATE:2020-03-28 04:50:21, IP:69.163.162.211, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-03-28 13:09:34
80.211.236.89 attackbots
Mar 27 21:27:40 mockhub sshd[26825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.236.89
Mar 27 21:27:43 mockhub sshd[26825]: Failed password for invalid user kiban01 from 80.211.236.89 port 59110 ssh2
...
2020-03-28 12:57:13
121.241.244.92 attackbots
$f2bV_matches
2020-03-28 12:37:56
195.122.226.164 attackspambots
Mar 28 06:06:23 v22018086721571380 sshd[25607]: Failed password for invalid user kej from 195.122.226.164 port 58615 ssh2
2020-03-28 13:17:59
45.143.220.104 attack
*Port Scan* detected from 45.143.220.104 (NL/Netherlands/-). 11 hits in the last 25 seconds
2020-03-28 13:11:21
188.243.100.4 attackspambots
Mar 28 04:53:13 localhost sshd[118195]: Invalid user qnk from 188.243.100.4 port 33716
Mar 28 04:53:13 localhost sshd[118195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.243.100.4
Mar 28 04:53:13 localhost sshd[118195]: Invalid user qnk from 188.243.100.4 port 33716
Mar 28 04:53:14 localhost sshd[118195]: Failed password for invalid user qnk from 188.243.100.4 port 33716 ssh2
Mar 28 04:58:43 localhost sshd[118762]: Invalid user pxn from 188.243.100.4 port 46210
...
2020-03-28 13:06:17
167.99.83.237 attackbotsspam
Mar 27 23:59:12 v22018086721571380 sshd[20140]: Failed password for invalid user omu from 167.99.83.237 port 57256 ssh2
Mar 28 04:54:10 v22018086721571380 sshd[11417]: Failed password for invalid user qb from 167.99.83.237 port 59926 ssh2
2020-03-28 13:15:12
222.186.52.139 attackbots
Unauthorized connection attempt detected from IP address 222.186.52.139 to port 22
2020-03-28 12:40:41
111.230.248.93 attack
Mar 28 04:54:57 * sshd[8187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.248.93
Mar 28 04:54:59 * sshd[8187]: Failed password for invalid user cmf from 111.230.248.93 port 35784 ssh2
2020-03-28 12:38:12
182.61.3.223 attackbots
Fail2Ban Ban Triggered
2020-03-28 13:20:28

Recently Reported IPs

176.59.108.22 176.59.108.237 189.95.55.174 49.245.25.53
125.142.30.48 202.164.167.198 203.126.225.12 188.26.59.160
62.171.191.10 174.250.212.79 45.145.67.172 58.248.116.33
59.97.168.107 59.151.244.11 60.169.81.186 75.127.180.211
83.224.160.81 91.33.175.145 94.232.44.122 109.86.239.53