Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Secaucus

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.106.243.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.106.243.170.		IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052602 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 27 07:35:27 CST 2022
;; MSG SIZE  rcvd: 108
Host info
170.243.106.104.in-addr.arpa domain name pointer a104-106-243-170.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
170.243.106.104.in-addr.arpa	name = a104-106-243-170.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.32.52.174 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 01:58:28
202.166.174.27 attackbots
Port 1433 Scan
2019-10-24 01:36:53
203.162.166.19 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:05:42
180.178.55.10 attack
2019-10-24T00:28:30.124948enmeeting.mahidol.ac.th sshd\[32671\]: Invalid user gertrud from 180.178.55.10 port 37038
2019-10-24T00:28:30.143539enmeeting.mahidol.ac.th sshd\[32671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.178.55.10
2019-10-24T00:28:32.504267enmeeting.mahidol.ac.th sshd\[32671\]: Failed password for invalid user gertrud from 180.178.55.10 port 37038 ssh2
...
2019-10-24 01:29:44
207.180.212.182 attackbots
[portscan] Port scan
2019-10-24 01:24:01
139.198.18.120 attackspambots
Oct 23 18:49:07 DAAP sshd[18052]: Invalid user guest2 from 139.198.18.120 port 52112
Oct 23 18:49:07 DAAP sshd[18052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.18.120
Oct 23 18:49:07 DAAP sshd[18052]: Invalid user guest2 from 139.198.18.120 port 52112
Oct 23 18:49:09 DAAP sshd[18052]: Failed password for invalid user guest2 from 139.198.18.120 port 52112 ssh2
Oct 23 18:54:03 DAAP sshd[18108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.18.120  user=root
Oct 23 18:54:06 DAAP sshd[18108]: Failed password for root from 139.198.18.120 port 33124 ssh2
...
2019-10-24 01:53:12
220.135.232.45 attack
Port Scan
2019-10-24 01:44:10
125.45.17.41 attackspambots
23/tcp
[2019-10-23]1pkt
2019-10-24 01:23:19
46.101.17.215 attackspambots
Invalid user vpopmail from 46.101.17.215 port 49130
2019-10-24 02:00:28
5.249.148.135 attackspam
Invalid user rendhy from 5.249.148.135 port 34924
2019-10-24 01:43:39
13.229.120.38 attackbotsspam
Unauthorised access (Oct 23) SRC=13.229.120.38 LEN=40 TTL=239 ID=3734 TCP DPT=445 WINDOW=1024 SYN
2019-10-24 01:48:00
148.70.223.29 attackbots
Oct 23 18:09:24 server sshd\[10743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.29  user=root
Oct 23 18:09:27 server sshd\[10743\]: Failed password for root from 148.70.223.29 port 37880 ssh2
Oct 23 18:24:33 server sshd\[15692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.29  user=root
Oct 23 18:24:35 server sshd\[15692\]: Failed password for root from 148.70.223.29 port 44052 ssh2
Oct 23 18:37:45 server sshd\[19446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.29  user=root
...
2019-10-24 01:19:22
203.195.177.202 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:08:19
138.197.78.121 attackspambots
2019-10-23T16:24:41.830904scmdmz1 sshd\[3063\]: Invalid user oracle from 138.197.78.121 port 59592
2019-10-23T16:24:41.833368scmdmz1 sshd\[3063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121
2019-10-23T16:24:43.768616scmdmz1 sshd\[3063\]: Failed password for invalid user oracle from 138.197.78.121 port 59592 ssh2
...
2019-10-24 01:39:43
115.159.50.93 attack
Automatic report - Banned IP Access
2019-10-24 01:58:44

Recently Reported IPs

104.106.232.48 104.106.243.32 104.106.246.15 104.106.250.72
104.106.251.103 104.106.251.125 104.106.251.142 104.106.251.204
104.106.251.48 104.106.251.58 104.106.252.153 104.106.252.207
104.106.252.79 104.106.254.55 104.106.255.228 104.106.255.65
104.107.0.178 104.107.0.40 104.107.0.68 104.107.10.137