Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: Akamai International B.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.134.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64983
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.107.134.119.		IN	A

;; AUTHORITY SECTION:
.			2715	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090301 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Sep 04 02:13:05 CST 2019
;; MSG SIZE  rcvd: 119
Host info
119.134.107.104.in-addr.arpa domain name pointer a104-107-134-119.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
119.134.107.104.in-addr.arpa	name = a104-107-134-119.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.231.103 attackbots
detected by Fail2Ban
2020-07-05 05:07:53
106.13.47.10 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-07-05 05:17:33
159.89.174.224 attack
(sshd) Failed SSH login from 159.89.174.224 (IN/India/demo.anybank.co.in): 5 in the last 3600 secs
2020-07-05 04:49:25
119.96.87.52 attackspam
2020-07-04T22:28:48.7356481240 sshd\[25525\]: Invalid user upload from 119.96.87.52 port 36614
2020-07-04T22:28:48.7397421240 sshd\[25525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.87.52
2020-07-04T22:28:51.0984501240 sshd\[25525\]: Failed password for invalid user upload from 119.96.87.52 port 36614 ssh2
...
2020-07-05 04:39:47
88.102.244.211 attack
2020-07-04T22:22:00.072112sd-86998 sshd[48165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.244.broadband7.iol.cz  user=root
2020-07-04T22:22:01.752506sd-86998 sshd[48165]: Failed password for root from 88.102.244.211 port 54386 ssh2
2020-07-04T22:25:34.353314sd-86998 sshd[48534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.244.broadband7.iol.cz  user=root
2020-07-04T22:25:36.411546sd-86998 sshd[48534]: Failed password for root from 88.102.244.211 port 39050 ssh2
2020-07-04T22:28:26.110705sd-86998 sshd[49016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.244.broadband7.iol.cz  user=root
2020-07-04T22:28:27.782120sd-86998 sshd[49016]: Failed password for root from 88.102.244.211 port 44880 ssh2
...
2020-07-05 05:05:42
180.151.56.113 attackspam
Jul  4 22:28:12 rancher-0 sshd[132085]: Invalid user sss from 180.151.56.113 port 35074
...
2020-07-05 05:21:18
45.143.220.130 attackspam
" "
2020-07-05 05:15:52
199.115.195.125 attack
$f2bV_matches
2020-07-05 04:53:33
190.207.80.13 attackbotsspam
1593894518 - 07/04/2020 22:28:38 Host: 190.207.80.13/190.207.80.13 Port: 445 TCP Blocked
2020-07-05 04:54:03
107.170.99.119 attack
2020-07-04T20:57:35.013894mail.csmailer.org sshd[30897]: Invalid user m1 from 107.170.99.119 port 40091
2020-07-04T20:57:35.018303mail.csmailer.org sshd[30897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.99.119
2020-07-04T20:57:35.013894mail.csmailer.org sshd[30897]: Invalid user m1 from 107.170.99.119 port 40091
2020-07-04T20:57:37.462246mail.csmailer.org sshd[30897]: Failed password for invalid user m1 from 107.170.99.119 port 40091 ssh2
2020-07-04T20:58:54.155599mail.csmailer.org sshd[31006]: Invalid user bigdata from 107.170.99.119 port 47610
...
2020-07-05 05:18:02
80.254.104.24 attackbotsspam
20/7/4@16:28:40: FAIL: Alarm-Network address from=80.254.104.24
...
2020-07-05 04:51:22
185.175.93.14 attackbotsspam
07/04/2020-16:40:39.548796 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-05 05:16:16
123.206.51.192 attack
Jul  4 22:20:49 server sshd[28049]: Failed password for root from 123.206.51.192 port 57942 ssh2
Jul  4 22:24:31 server sshd[31908]: Failed password for invalid user planeacion from 123.206.51.192 port 42938 ssh2
Jul  4 22:28:17 server sshd[3611]: Failed password for root from 123.206.51.192 port 56172 ssh2
2020-07-05 05:16:45
112.85.42.176 attack
Jul  4 22:57:11 vm0 sshd[17113]: Failed password for root from 112.85.42.176 port 2969 ssh2
Jul  4 22:57:25 vm0 sshd[17113]: error: maximum authentication attempts exceeded for root from 112.85.42.176 port 2969 ssh2 [preauth]
...
2020-07-05 04:59:07
180.76.167.204 attack
" "
2020-07-05 04:55:25

Recently Reported IPs

62.88.193.118 175.174.13.40 86.17.182.218 183.4.222.221
152.1.140.24 214.148.246.144 129.69.189.143 95.144.170.39
41.102.205.13 41.41.174.170 54.175.5.136 131.193.161.158
192.45.111.28 104.4.160.233 178.15.9.60 38.0.135.84
98.73.83.217 188.66.218.162 152.16.31.24 222.15.220.100