Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.14.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13895
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.107.14.157.			IN	A

;; AUTHORITY SECTION:
.			296	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022100 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:13:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
157.14.107.104.in-addr.arpa domain name pointer a104-107-14-157.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.14.107.104.in-addr.arpa	name = a104-107-14-157.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.55.248.235 attackbots
Jun 28 05:50:27 inter-technics sshd[9495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.248.235  user=root
Jun 28 05:50:28 inter-technics sshd[9495]: Failed password for root from 106.55.248.235 port 52636 ssh2
Jun 28 05:52:32 inter-technics sshd[9627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.248.235  user=root
Jun 28 05:52:34 inter-technics sshd[9627]: Failed password for root from 106.55.248.235 port 53432 ssh2
Jun 28 05:54:31 inter-technics sshd[9706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.248.235  user=root
Jun 28 05:54:34 inter-technics sshd[9706]: Failed password for root from 106.55.248.235 port 54208 ssh2
...
2020-06-28 14:27:07
192.241.215.53 attackspam
Port probing on unauthorized port 2078
2020-06-28 14:07:47
218.92.0.168 attack
Jun 28 05:57:44 localhost sshd[114768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
Jun 28 05:57:46 localhost sshd[114768]: Failed password for root from 218.92.0.168 port 36574 ssh2
Jun 28 05:57:49 localhost sshd[114768]: Failed password for root from 218.92.0.168 port 36574 ssh2
Jun 28 05:57:44 localhost sshd[114768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
Jun 28 05:57:46 localhost sshd[114768]: Failed password for root from 218.92.0.168 port 36574 ssh2
Jun 28 05:57:49 localhost sshd[114768]: Failed password for root from 218.92.0.168 port 36574 ssh2
Jun 28 05:57:44 localhost sshd[114768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
Jun 28 05:57:46 localhost sshd[114768]: Failed password for root from 218.92.0.168 port 36574 ssh2
Jun 28 05:57:49 localhost sshd[114768]: Failed pa
...
2020-06-28 14:19:58
222.186.180.147 attackbots
Jun 28 08:22:35 minden010 sshd[24343]: Failed password for root from 222.186.180.147 port 24198 ssh2
Jun 28 08:22:38 minden010 sshd[24343]: Failed password for root from 222.186.180.147 port 24198 ssh2
Jun 28 08:22:42 minden010 sshd[24343]: Failed password for root from 222.186.180.147 port 24198 ssh2
Jun 28 08:22:45 minden010 sshd[24343]: Failed password for root from 222.186.180.147 port 24198 ssh2
...
2020-06-28 14:30:03
106.52.147.110 attack
$f2bV_matches
2020-06-28 14:10:20
111.229.246.61 attackspambots
Invalid user link from 111.229.246.61 port 53664
2020-06-28 14:18:39
71.167.45.98 attackbots
Jun 28 07:26:29 vpn01 sshd[15695]: Failed password for root from 71.167.45.98 port 56825 ssh2
...
2020-06-28 14:34:54
222.186.30.35 attack
28.06.2020 06:24:40 SSH access blocked by firewall
2020-06-28 14:40:34
157.230.47.241 attack
Jun 28 08:31:44 PorscheCustomer sshd[9691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.47.241
Jun 28 08:31:46 PorscheCustomer sshd[9691]: Failed password for invalid user kalista from 157.230.47.241 port 54060 ssh2
Jun 28 08:35:42 PorscheCustomer sshd[9810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.47.241
...
2020-06-28 14:45:14
117.50.65.85 attackspam
Jun 27 21:07:00 dignus sshd[29801]: Failed password for invalid user jmiguel from 117.50.65.85 port 54320 ssh2
Jun 27 21:09:00 dignus sshd[29946]: Invalid user bsh from 117.50.65.85 port 55134
Jun 27 21:09:00 dignus sshd[29946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85
Jun 27 21:09:03 dignus sshd[29946]: Failed password for invalid user bsh from 117.50.65.85 port 55134 ssh2
Jun 27 21:11:01 dignus sshd[30101]: Invalid user mantis from 117.50.65.85 port 55954
...
2020-06-28 14:09:40
173.82.52.26 attack
Automatic report - XMLRPC Attack
2020-06-28 14:23:41
175.124.43.162 attack
2020-06-28T01:53:30.459577xentho-1 sshd[716315]: Failed password for invalid user image from 175.124.43.162 port 53926 ssh2
2020-06-28T01:54:14.298958xentho-1 sshd[716332]: Invalid user doctor from 175.124.43.162 port 35982
2020-06-28T01:54:14.305301xentho-1 sshd[716332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162
2020-06-28T01:54:14.298958xentho-1 sshd[716332]: Invalid user doctor from 175.124.43.162 port 35982
2020-06-28T01:54:16.273977xentho-1 sshd[716332]: Failed password for invalid user doctor from 175.124.43.162 port 35982 ssh2
2020-06-28T01:54:59.210677xentho-1 sshd[716360]: Invalid user git from 175.124.43.162 port 46268
2020-06-28T01:54:59.217095xentho-1 sshd[716360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162
2020-06-28T01:54:59.210677xentho-1 sshd[716360]: Invalid user git from 175.124.43.162 port 46268
2020-06-28T01:55:01.029708xentho-1 sshd[716360]: Fail
...
2020-06-28 14:28:29
79.137.34.248 attack
Invalid user ska from 79.137.34.248 port 43428
2020-06-28 14:38:07
129.211.107.82 attackspambots
20 attempts against mh-ssh on storm
2020-06-28 14:06:48
197.234.57.142 attackbots
Activity:	Failed log on (Failure message: Error validating credentials due to invalid username or password.)
2020-06-28 14:29:38

Recently Reported IPs

104.107.13.169 104.107.15.35 104.107.2.51 104.107.2.70
104.107.4.174 104.107.4.18 104.107.4.19 104.107.4.24
104.107.4.73 104.107.6.192 104.107.8.200 104.107.8.84
104.107.9.150 104.107.9.231 101.108.93.91 104.112.16.82
104.112.30.13 104.112.30.17 104.112.35.122 104.117.38.236