Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.109.153.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.109.153.104.		IN	A

;; AUTHORITY SECTION:
.			60	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040102 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 22:46:53 CST 2022
;; MSG SIZE  rcvd: 108
Host info
104.153.109.104.in-addr.arpa domain name pointer a104-109-153-104.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.153.109.104.in-addr.arpa	name = a104-109-153-104.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.213.63.120 attackbotsspam
Oct  6 13:49:59 MK-Soft-VM3 sshd[30772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120 
Oct  6 13:50:01 MK-Soft-VM3 sshd[30772]: Failed password for invalid user Step@2017 from 129.213.63.120 port 36366 ssh2
...
2019-10-06 19:55:26
187.73.205.82 attackbots
2019-10-06T13:49:04.601409MailD postfix/smtpd[17896]: NOQUEUE: reject: RCPT from host-205-82.host.stetnet.com.br[187.73.205.82]: 554 5.7.1 Service unavailable; Client host [187.73.205.82] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?187.73.205.82; from= to= proto=ESMTP helo=
2019-10-06T13:49:05.212667MailD postfix/smtpd[17896]: NOQUEUE: reject: RCPT from host-205-82.host.stetnet.com.br[187.73.205.82]: 554 5.7.1 Service unavailable; Client host [187.73.205.82] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?187.73.205.82; from= to= proto=ESMTP helo=
2019-10-06T13:49:05.779258MailD postfix/smtpd[17896]: NOQUEUE: reject: RCPT from host-205-82.host.stetnet.com.br[187.73.205.82]: 554 5.7.1 Service unavailable; Client host [187.73.205.82] blocked using bl.spamcop.net; Blocked - see https://w
2019-10-06 20:25:31
198.199.83.59 attackbotsspam
Oct  6 12:03:06 game-panel sshd[20072]: Failed password for root from 198.199.83.59 port 38855 ssh2
Oct  6 12:08:07 game-panel sshd[20275]: Failed password for root from 198.199.83.59 port 33980 ssh2
2019-10-06 20:28:31
216.245.220.166 attack
\[2019-10-06 07:49:44\] NOTICE\[1887\] chan_sip.c: Registration from '"100" \' failed for '216.245.220.166:5362' - Wrong password
\[2019-10-06 07:49:44\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-06T07:49:44.995-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="100",SessionID="0x7fc3ac906718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/216.245.220.166/5362",Challenge="14e1bab8",ReceivedChallenge="14e1bab8",ReceivedHash="186566f8f04191775bf66c5ab2822b93"
\[2019-10-06 07:49:45\] NOTICE\[1887\] chan_sip.c: Registration from '"100" \' failed for '216.245.220.166:5362' - Wrong password
\[2019-10-06 07:49:45\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-06T07:49:45.059-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="100",SessionID="0x7fc3ac62e4e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD
2019-10-06 20:01:30
212.64.61.70 attackspambots
Oct  6 13:14:11 microserver sshd[24587]: Invalid user 123ewqasdcxz from 212.64.61.70 port 58358
Oct  6 13:14:11 microserver sshd[24587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.61.70
Oct  6 13:14:12 microserver sshd[24587]: Failed password for invalid user 123ewqasdcxz from 212.64.61.70 port 58358 ssh2
Oct  6 13:18:19 microserver sshd[25228]: Invalid user 123ewqasdcxz from 212.64.61.70 port 39528
Oct  6 13:18:19 microserver sshd[25228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.61.70
Oct  6 13:30:41 microserver sshd[27104]: Invalid user Grande_123 from 212.64.61.70 port 39384
Oct  6 13:30:41 microserver sshd[27104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.61.70
Oct  6 13:30:43 microserver sshd[27104]: Failed password for invalid user Grande_123 from 212.64.61.70 port 39384 ssh2
Oct  6 13:34:40 microserver sshd[27321]: Invalid user Bed@123 from 212.6
2019-10-06 19:59:58
58.229.208.187 attack
Oct  6 13:49:13 MK-Soft-VM7 sshd[24067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.229.208.187 
Oct  6 13:49:15 MK-Soft-VM7 sshd[24067]: Failed password for invalid user Darkness@123 from 58.229.208.187 port 40392 ssh2
...
2019-10-06 20:16:22
180.93.12.179 attackbotsspam
Unauthorised access (Oct  6) SRC=180.93.12.179 LEN=40 PREC=0x20 TTL=48 ID=22885 TCP DPT=8080 WINDOW=7953 SYN 
Unauthorised access (Oct  6) SRC=180.93.12.179 LEN=40 PREC=0x20 TTL=48 ID=37529 TCP DPT=8080 WINDOW=7953 SYN
2019-10-06 20:07:38
139.155.44.100 attackbotsspam
Oct  6 13:49:56 dedicated sshd[682]: Invalid user Admin#321 from 139.155.44.100 port 41030
2019-10-06 19:57:49
104.197.155.193 attackspambots
schuetzenmusikanten.de 104.197.155.193 \[06/Oct/2019:13:49:06 +0200\] "POST /wp-login.php HTTP/1.1" 200 5682 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 104.197.155.193 \[06/Oct/2019:13:49:08 +0200\] "POST /wp-login.php HTTP/1.1" 200 5648 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-06 20:24:25
222.186.175.183 attackspam
Oct  6 14:57:43 pkdns2 sshd\[34831\]: Failed password for root from 222.186.175.183 port 32852 ssh2Oct  6 14:57:48 pkdns2 sshd\[34831\]: Failed password for root from 222.186.175.183 port 32852 ssh2Oct  6 14:57:52 pkdns2 sshd\[34831\]: Failed password for root from 222.186.175.183 port 32852 ssh2Oct  6 14:57:57 pkdns2 sshd\[34831\]: Failed password for root from 222.186.175.183 port 32852 ssh2Oct  6 14:58:00 pkdns2 sshd\[34831\]: Failed password for root from 222.186.175.183 port 32852 ssh2Oct  6 14:58:12 pkdns2 sshd\[34867\]: Failed password for root from 222.186.175.183 port 48046 ssh2
...
2019-10-06 20:06:28
180.76.242.171 attackspam
Oct  6 13:30:48 microserver sshd[27121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.242.171  user=root
Oct  6 13:30:49 microserver sshd[27121]: Failed password for root from 180.76.242.171 port 33138 ssh2
Oct  6 13:35:00 microserver sshd[27354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.242.171  user=root
Oct  6 13:35:02 microserver sshd[27354]: Failed password for root from 180.76.242.171 port 38762 ssh2
Oct  6 13:39:18 microserver sshd[28005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.242.171  user=root
Oct  6 13:51:50 microserver sshd[29879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.242.171  user=root
Oct  6 13:51:52 microserver sshd[29879]: Failed password for root from 180.76.242.171 port 33018 ssh2
Oct  6 13:56:01 microserver sshd[30534]: pam_unix(sshd:auth): authentication failure; logname= uid
2019-10-06 20:33:20
119.29.242.48 attackbotsspam
2019-10-06T12:00:23.624810stark.klein-stark.info sshd\[32744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.242.48  user=root
2019-10-06T12:00:25.877686stark.klein-stark.info sshd\[32744\]: Failed password for root from 119.29.242.48 port 39850 ssh2
2019-10-06T13:49:54.948024stark.klein-stark.info sshd\[7574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.242.48  user=root
...
2019-10-06 19:57:05
46.101.17.215 attackspambots
Oct  6 02:15:56 hanapaa sshd\[8554\]: Invalid user Losenord1@3 from 46.101.17.215
Oct  6 02:15:56 hanapaa sshd\[8554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=policies.musiciansfirst.com
Oct  6 02:15:58 hanapaa sshd\[8554\]: Failed password for invalid user Losenord1@3 from 46.101.17.215 port 58318 ssh2
Oct  6 02:19:43 hanapaa sshd\[8877\]: Invalid user Admin@800 from 46.101.17.215
Oct  6 02:19:43 hanapaa sshd\[8877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=policies.musiciansfirst.com
2019-10-06 20:21:21
81.182.254.124 attack
Oct  6 11:40:35 ip-172-31-62-245 sshd\[13325\]: Invalid user 123 from 81.182.254.124\
Oct  6 11:40:37 ip-172-31-62-245 sshd\[13325\]: Failed password for invalid user 123 from 81.182.254.124 port 57842 ssh2\
Oct  6 11:44:59 ip-172-31-62-245 sshd\[13353\]: Invalid user P4rol41@3\$ from 81.182.254.124\
Oct  6 11:45:01 ip-172-31-62-245 sshd\[13353\]: Failed password for invalid user P4rol41@3\$ from 81.182.254.124 port 42080 ssh2\
Oct  6 11:49:13 ip-172-31-62-245 sshd\[13382\]: Invalid user Passw0rt1qaz from 81.182.254.124\
2019-10-06 20:21:58
49.88.112.85 attack
Oct  6 14:55:10 server2 sshd\[30516\]: User root from 49.88.112.85 not allowed because not listed in AllowUsers
Oct  6 14:55:10 server2 sshd\[30518\]: User root from 49.88.112.85 not allowed because not listed in AllowUsers
Oct  6 14:55:10 server2 sshd\[30522\]: User root from 49.88.112.85 not allowed because not listed in AllowUsers
Oct  6 14:55:11 server2 sshd\[30524\]: User root from 49.88.112.85 not allowed because not listed in AllowUsers
Oct  6 14:55:12 server2 sshd\[30520\]: User root from 49.88.112.85 not allowed because not listed in AllowUsers
Oct  6 14:56:22 server2 sshd\[30571\]: User root from 49.88.112.85 not allowed because not listed in AllowUsers
2019-10-06 19:56:34

Recently Reported IPs

104.108.105.101 104.109.154.247 104.11.255.167 104.110.156.52
104.111.100.214 104.111.101.90 104.111.102.168 122.137.150.142
205.72.159.163 104.111.104.228 104.111.105.65 104.111.108.158
104.111.114.139 104.111.114.192 241.225.236.8 41.88.5.80
104.111.34.202 104.111.99.185 104.112.235.114 104.112.235.90