Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.106.240.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.106.240.149.		IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:29:46 CST 2022
;; MSG SIZE  rcvd: 108
Host info
149.240.106.104.in-addr.arpa domain name pointer a104-106-240-149.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.240.106.104.in-addr.arpa	name = a104-106-240-149.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.27.11 attackspam
2019-12-09T08:34:10.218830  sshd[1211]: Invalid user csua from 106.12.27.11 port 34782
2019-12-09T08:34:10.233838  sshd[1211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.11
2019-12-09T08:34:10.218830  sshd[1211]: Invalid user csua from 106.12.27.11 port 34782
2019-12-09T08:34:11.880025  sshd[1211]: Failed password for invalid user csua from 106.12.27.11 port 34782 ssh2
2019-12-09T08:40:42.508339  sshd[1356]: Invalid user MGR from 106.12.27.11 port 60542
...
2019-12-09 15:42:51
218.92.0.175 attackbots
Dec  9 08:10:08 * sshd[12784]: Failed password for root from 218.92.0.175 port 35385 ssh2
Dec  9 08:10:21 * sshd[12784]: error: maximum authentication attempts exceeded for root from 218.92.0.175 port 35385 ssh2 [preauth]
2019-12-09 15:10:57
140.143.222.95 attackspambots
$f2bV_matches
2019-12-09 15:41:30
117.50.63.227 attackspambots
Fail2Ban Ban Triggered
2019-12-09 15:16:50
14.98.4.82 attackbots
$f2bV_matches
2019-12-09 15:34:54
14.63.221.108 attackspambots
Dec  9 09:16:49 sauna sshd[59039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.221.108
Dec  9 09:16:50 sauna sshd[59039]: Failed password for invalid user seiro from 14.63.221.108 port 51985 ssh2
...
2019-12-09 15:35:17
223.71.167.154 attack
223.71.167.154 was recorded 26 times by 4 hosts attempting to connect to the following ports: 8041,12000,2379,5601,8002,993,5007,40000,4410,8333,8007,1234,9595,28017,49153,25000,280,1880,5060,10443,3299,1311,4500,8123,32771,55443. Incident counter (4h, 24h, all-time): 26, 155, 2838
2019-12-09 15:35:41
50.70.229.239 attackbotsspam
Dec  8 21:02:33 kapalua sshd\[17149\]: Invalid user plex from 50.70.229.239
Dec  8 21:02:33 kapalua sshd\[17149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106105611a4b7a2.wp.shawcable.net
Dec  8 21:02:35 kapalua sshd\[17149\]: Failed password for invalid user plex from 50.70.229.239 port 39028 ssh2
Dec  8 21:08:04 kapalua sshd\[17714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106105611a4b7a2.wp.shawcable.net  user=backup
Dec  8 21:08:06 kapalua sshd\[17714\]: Failed password for backup from 50.70.229.239 port 46832 ssh2
2019-12-09 15:08:18
54.37.69.251 attackbotsspam
2019-12-09T07:03:53.026408abusebot-8.cloudsearch.cf sshd\[29394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=251.ip-54-37-69.eu  user=root
2019-12-09 15:31:21
43.249.194.245 attack
Dec  9 08:30:45 pkdns2 sshd\[36126\]: Invalid user admin from 43.249.194.245Dec  9 08:30:47 pkdns2 sshd\[36126\]: Failed password for invalid user admin from 43.249.194.245 port 47604 ssh2Dec  9 08:35:13 pkdns2 sshd\[36422\]: Invalid user password from 43.249.194.245Dec  9 08:35:15 pkdns2 sshd\[36422\]: Failed password for invalid user password from 43.249.194.245 port 64601 ssh2Dec  9 08:39:40 pkdns2 sshd\[36639\]: Invalid user oracle from 43.249.194.245Dec  9 08:39:42 pkdns2 sshd\[36639\]: Failed password for invalid user oracle from 43.249.194.245 port 26834 ssh2
...
2019-12-09 15:19:30
180.106.81.168 attackspambots
Dec  9 08:17:52 vpn01 sshd[30910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.106.81.168
Dec  9 08:17:54 vpn01 sshd[30910]: Failed password for invalid user operator from 180.106.81.168 port 44130 ssh2
...
2019-12-09 15:38:16
213.82.114.206 attackbotsspam
2019-12-09T07:10:49.636033abusebot-6.cloudsearch.cf sshd\[25114\]: Invalid user backup from 213.82.114.206 port 58158
2019-12-09 15:12:10
185.244.167.52 attackspambots
Dec  9 07:23:45 ns382633 sshd\[12668\]: Invalid user antonino from 185.244.167.52 port 60294
Dec  9 07:23:45 ns382633 sshd\[12668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.167.52
Dec  9 07:23:47 ns382633 sshd\[12668\]: Failed password for invalid user antonino from 185.244.167.52 port 60294 ssh2
Dec  9 07:30:39 ns382633 sshd\[14191\]: Invalid user tandle from 185.244.167.52 port 36444
Dec  9 07:30:39 ns382633 sshd\[14191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.167.52
2019-12-09 15:37:53
203.195.207.40 attackspam
Dec  8 21:18:56 hpm sshd\[21129\]: Invalid user fuglestvedt from 203.195.207.40
Dec  8 21:18:56 hpm sshd\[21129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.207.40
Dec  8 21:18:59 hpm sshd\[21129\]: Failed password for invalid user fuglestvedt from 203.195.207.40 port 57510 ssh2
Dec  8 21:25:02 hpm sshd\[21817\]: Invalid user siadat from 203.195.207.40
Dec  8 21:25:02 hpm sshd\[21817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.207.40
2019-12-09 15:36:42
106.12.8.249 attackbots
2019-12-09T06:39:43.493503abusebot-2.cloudsearch.cf sshd\[28555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.249  user=root
2019-12-09 15:18:10

Recently Reported IPs

104.106.243.101 104.106.240.33 104.106.242.79 104.106.244.124
104.106.245.218 104.106.245.216 104.106.244.51 104.106.245.147
104.106.247.93 104.106.246.89 104.106.245.229 104.106.246.124
104.106.248.171 104.21.62.83 104.106.245.236 104.106.246.10
104.106.249.112 104.106.249.204 104.106.249.146 104.106.249.220