Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.5.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.107.5.125.			IN	A

;; AUTHORITY SECTION:
.			110	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 13:44:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
125.5.107.104.in-addr.arpa domain name pointer a104-107-5-125.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.5.107.104.in-addr.arpa	name = a104-107-5-125.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.8 attack
Sep 22 02:14:57 MainVPS sshd[10989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.8  user=root
Sep 22 02:14:59 MainVPS sshd[10989]: Failed password for root from 222.186.175.8 port 62240 ssh2
Sep 22 02:15:27 MainVPS sshd[10989]: Failed password for root from 222.186.175.8 port 62240 ssh2
Sep 22 02:14:57 MainVPS sshd[10989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.8  user=root
Sep 22 02:14:59 MainVPS sshd[10989]: Failed password for root from 222.186.175.8 port 62240 ssh2
Sep 22 02:15:27 MainVPS sshd[10989]: Failed password for root from 222.186.175.8 port 62240 ssh2
Sep 22 02:14:57 MainVPS sshd[10989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.8  user=root
Sep 22 02:14:59 MainVPS sshd[10989]: Failed password for root from 222.186.175.8 port 62240 ssh2
Sep 22 02:15:27 MainVPS sshd[10989]: Failed password for root from 222.186.175.8 port 622
2019-09-22 08:21:23
212.156.83.182 attack
Unauthorized connection attempt from IP address 212.156.83.182 on Port 445(SMB)
2019-09-22 08:09:51
171.239.22.71 attackspam
Unauthorized connection attempt from IP address 171.239.22.71 on Port 445(SMB)
2019-09-22 08:31:41
122.10.90.4 attackspam
Unauthorized connection attempt from IP address 122.10.90.4 on Port 445(SMB)
2019-09-22 08:18:49
5.135.182.84 attackbots
Sep 21 23:45:50 vps01 sshd[14743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.182.84
Sep 21 23:45:52 vps01 sshd[14743]: Failed password for invalid user pwddbo from 5.135.182.84 port 40140 ssh2
2019-09-22 08:10:56
132.232.86.7 attackbotsspam
Sep 21 13:44:17 web9 sshd\[32529\]: Invalid user test2 from 132.232.86.7
Sep 21 13:44:17 web9 sshd\[32529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.86.7
Sep 21 13:44:18 web9 sshd\[32529\]: Failed password for invalid user test2 from 132.232.86.7 port 35677 ssh2
Sep 21 13:48:36 web9 sshd\[946\]: Invalid user 123456 from 132.232.86.7
Sep 21 13:48:36 web9 sshd\[946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.86.7
2019-09-22 08:23:10
73.87.97.23 attackspam
Sep 21 13:58:42 php1 sshd\[3637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.87.97.23  user=root
Sep 21 13:58:44 php1 sshd\[3637\]: Failed password for root from 73.87.97.23 port 37607 ssh2
Sep 21 14:03:19 php1 sshd\[4074\]: Invalid user user from 73.87.97.23
Sep 21 14:03:19 php1 sshd\[4074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.87.97.23
Sep 21 14:03:21 php1 sshd\[4074\]: Failed password for invalid user user from 73.87.97.23 port 37635 ssh2
2019-09-22 08:17:29
196.203.183.99 attackspambots
firewall-block, port(s): 161/udp
2019-09-22 08:21:40
222.186.31.144 attack
Sep 22 02:12:14 MK-Soft-VM6 sshd[12526]: Failed password for root from 222.186.31.144 port 26970 ssh2
Sep 22 02:12:18 MK-Soft-VM6 sshd[12526]: Failed password for root from 222.186.31.144 port 26970 ssh2
...
2019-09-22 08:16:19
94.23.254.24 attack
Sep 22 01:25:16 markkoudstaal sshd[11143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.254.24
Sep 22 01:25:18 markkoudstaal sshd[11143]: Failed password for invalid user ubuntu from 94.23.254.24 port 49337 ssh2
Sep 22 01:34:11 markkoudstaal sshd[11989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.254.24
2019-09-22 07:57:45
51.83.15.30 attack
Sep 21 13:39:51 hcbb sshd\[13243\]: Invalid user yuri from 51.83.15.30
Sep 21 13:39:51 hcbb sshd\[13243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.15.30
Sep 21 13:39:53 hcbb sshd\[13243\]: Failed password for invalid user yuri from 51.83.15.30 port 37270 ssh2
Sep 21 13:44:10 hcbb sshd\[13589\]: Invalid user ubuntu from 51.83.15.30
Sep 21 13:44:10 hcbb sshd\[13589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.15.30
2019-09-22 08:26:52
106.12.17.169 attackbots
Sep 22 01:38:13 ns41 sshd[1863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.169
2019-09-22 08:04:32
159.65.46.224 attackspam
Sep 22 02:17:14 MK-Soft-VM6 sshd[12566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.46.224 
Sep 22 02:17:16 MK-Soft-VM6 sshd[12566]: Failed password for invalid user test from 159.65.46.224 port 52078 ssh2
...
2019-09-22 08:25:57
37.187.192.162 attackspambots
Sep 22 02:57:35 site3 sshd\[214814\]: Invalid user samuel from 37.187.192.162
Sep 22 02:57:35 site3 sshd\[214814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.192.162
Sep 22 02:57:37 site3 sshd\[214814\]: Failed password for invalid user samuel from 37.187.192.162 port 35700 ssh2
Sep 22 03:02:00 site3 sshd\[215669\]: Invalid user zxcvbn from 37.187.192.162
Sep 22 03:02:00 site3 sshd\[215669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.192.162
...
2019-09-22 08:17:17
68.57.86.37 attackbots
2019-09-21T23:46:09.531955abusebot-2.cloudsearch.cf sshd\[28779\]: Invalid user prev from 68.57.86.37 port 48976
2019-09-22 08:15:54

Recently Reported IPs

104.236.20.206 104.107.8.247 104.107.9.136 104.109.145.70
104.109.150.100 104.107.10.184 104.107.7.6 104.107.7.97
104.109.157.132 104.109.156.20 104.236.205.169 104.112.235.242
104.112.235.217 104.112.39.151 104.114.165.91 104.112.246.186
104.117.33.176 104.125.74.73 104.126.112.166 104.236.206.196