Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.112.59.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21660
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.112.59.8.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400

;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 14:47:40 CST 2023
;; MSG SIZE  rcvd: 105
Host info
8.59.112.104.in-addr.arpa domain name pointer a104-112-59-8.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.59.112.104.in-addr.arpa	name = a104-112-59-8.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.7.222.203 attackbotsspam
Postfix RBL failed
2019-07-20 15:41:58
221.204.102.250 attackspam
Jul2003:27:54server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[anonymous]Jul2003:27:59server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]Jul2003:28:07server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]Jul2003:28:14server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[purexis]Jul2003:28:20server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[purexis]Jul2003:28:26server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]Jul2003:28:32server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]Jul2003:28:37server2pure-ftpd:\(\?@221.204.102.250\)[WARNING]Authenticationfailedforuser[www]
2019-07-20 14:59:30
23.129.64.192 attack
WordPress login Brute force / Web App Attack on client site.
2019-07-20 15:39:43
51.255.168.30 attack
Jul 20 08:51:09 meumeu sshd[12435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.30 
Jul 20 08:51:11 meumeu sshd[12435]: Failed password for invalid user ranger from 51.255.168.30 port 33716 ssh2
Jul 20 08:55:48 meumeu sshd[13161]: Failed password for root from 51.255.168.30 port 60956 ssh2
...
2019-07-20 15:01:03
210.212.240.234 attackbots
Jul 20 09:28:22 mail sshd\[9541\]: Invalid user admin from 210.212.240.234 port 45042
Jul 20 09:28:22 mail sshd\[9541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.240.234
Jul 20 09:28:24 mail sshd\[9541\]: Failed password for invalid user admin from 210.212.240.234 port 45042 ssh2
Jul 20 09:34:53 mail sshd\[10316\]: Invalid user tr from 210.212.240.234 port 41734
Jul 20 09:34:53 mail sshd\[10316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.240.234
2019-07-20 15:37:41
5.55.121.8 attack
Telnet Server BruteForce Attack
2019-07-20 15:31:06
14.225.3.37 attack
" "
2019-07-20 14:45:11
209.85.220.69 attackspam
Received: from mail-sor-f69.google.com (mail-sor-f69.google.com. [209.85.220.69])
        by mx.google.com with SMTPS id i22sor19127629qkg.73.2019.07.19.17.49.24
        for 
        (Google Transport Security);
        Fri, 19 Jul 2019 17:49:24 -0700 (PDT)

CareyHolzman just uploaded a video
Why You Always See Me Use The Back USB Port
http://www.youtube.com/watch?v=H-VT7jBVj3A&feature=em-uploademail
2019-07-20 15:20:28
218.92.1.142 attackbotsspam
Jul 20 00:25:37 TORMINT sshd\[28816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
Jul 20 00:25:39 TORMINT sshd\[28816\]: Failed password for root from 218.92.1.142 port 44976 ssh2
Jul 20 00:31:54 TORMINT sshd\[29016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
...
2019-07-20 15:43:47
185.234.218.129 attack
2019-07-20T06:28:33.898712beta postfix/smtpd[25234]: warning: unknown[185.234.218.129]: SASL LOGIN authentication failed: authentication failure
2019-07-20T06:37:27.770474beta postfix/smtpd[25413]: warning: unknown[185.234.218.129]: SASL LOGIN authentication failed: authentication failure
2019-07-20T06:46:19.207807beta postfix/smtpd[25506]: warning: unknown[185.234.218.129]: SASL LOGIN authentication failed: authentication failure
...
2019-07-20 15:18:05
120.92.102.121 attackspambots
2019-07-20T06:57:50.317262abusebot-4.cloudsearch.cf sshd\[18065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.102.121  user=root
2019-07-20 15:22:25
106.12.214.21 attackbots
Invalid user al from 106.12.214.21 port 45936
2019-07-20 15:42:32
104.40.4.156 attackspam
DATE:2019-07-20_03:27:19, IP:104.40.4.156, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-20 15:40:11
62.102.148.68 attackbotsspam
SSH Brute-Forcing (ownc)
2019-07-20 15:36:22
79.13.31.247 attackspambots
Automatic report - Port Scan Attack
2019-07-20 15:25:54

Recently Reported IPs

23.22.20.118 59.13.48.237 110.177.171.39 47.189.21.27
143.167.51.168 43.160.220.227 229.37.248.255 179.36.95.249
97.226.231.94 62.253.19.224 249.4.234.178 229.36.157.4
40.170.104.49 123.14.95.26 227.87.64.226 14.190.111.33
181.116.218.59 54.24.173.184 31.96.230.217 78.166.148.31