Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.112.75.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.112.75.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 20:47:39 CST 2025
;; MSG SIZE  rcvd: 107
Host info
241.75.112.104.in-addr.arpa domain name pointer a104-112-75-241.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.75.112.104.in-addr.arpa	name = a104-112-75-241.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.66.177.4 attackspambots
20/4/6@00:40:33: FAIL: Alarm-Network address from=103.66.177.4
20/4/6@00:40:33: FAIL: Alarm-Network address from=103.66.177.4
...
2020-04-06 17:56:00
190.219.47.42 attack
Apr  6 05:50:49 mout sshd[14760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.219.47.42  user=pi
Apr  6 05:50:51 mout sshd[14760]: Failed password for pi from 190.219.47.42 port 38944 ssh2
Apr  6 05:50:52 mout sshd[14760]: Connection closed by 190.219.47.42 port 38944 [preauth]
2020-04-06 17:55:06
136.232.66.174 attackbots
Apr  6 03:23:26 raspberrypi sshd\[25550\]: Failed password for root from 136.232.66.174 port 40374 ssh2Apr  6 03:45:29 raspberrypi sshd\[8267\]: Failed password for root from 136.232.66.174 port 35078 ssh2Apr  6 03:50:51 raspberrypi sshd\[11596\]: Failed password for root from 136.232.66.174 port 40074 ssh2
...
2020-04-06 17:53:32
125.166.116.68 attack
1586145055 - 04/06/2020 05:50:55 Host: 125.166.116.68/125.166.116.68 Port: 445 TCP Blocked
2020-04-06 17:54:01
31.46.16.95 attackbots
2020-04-06T09:05:31.975381abusebot-5.cloudsearch.cf sshd[26554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.16.95  user=root
2020-04-06T09:05:34.338390abusebot-5.cloudsearch.cf sshd[26554]: Failed password for root from 31.46.16.95 port 59282 ssh2
2020-04-06T09:08:40.976344abusebot-5.cloudsearch.cf sshd[26643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.16.95  user=root
2020-04-06T09:08:43.288710abusebot-5.cloudsearch.cf sshd[26643]: Failed password for root from 31.46.16.95 port 58498 ssh2
2020-04-06T09:11:52.634465abusebot-5.cloudsearch.cf sshd[26742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.16.95  user=root
2020-04-06T09:11:54.971829abusebot-5.cloudsearch.cf sshd[26742]: Failed password for root from 31.46.16.95 port 57710 ssh2
2020-04-06T09:14:55.164498abusebot-5.cloudsearch.cf sshd[26775]: pam_unix(sshd:auth): authentication fa
...
2020-04-06 17:40:32
180.242.154.17 attack
1586145087 - 04/06/2020 05:51:27 Host: 180.242.154.17/180.242.154.17 Port: 445 TCP Blocked
2020-04-06 17:30:16
106.13.147.69 attackbotsspam
2020-04-06T06:58:10.023416shield sshd\[15924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69  user=root
2020-04-06T06:58:12.074970shield sshd\[15924\]: Failed password for root from 106.13.147.69 port 35212 ssh2
2020-04-06T07:00:17.752537shield sshd\[16288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69  user=root
2020-04-06T07:00:19.242851shield sshd\[16288\]: Failed password for root from 106.13.147.69 port 59138 ssh2
2020-04-06T07:02:14.781535shield sshd\[16621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69  user=root
2020-04-06 17:48:01
120.56.52.66 attackspambots
1586145089 - 04/06/2020 05:51:29 Host: 120.56.52.66/120.56.52.66 Port: 445 TCP Blocked
2020-04-06 17:28:54
103.216.112.204 attackspambots
detected by Fail2Ban
2020-04-06 17:27:47
152.67.7.117 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-04-06 17:35:31
119.77.164.145 attackbotsspam
trying to access non-authorized port
2020-04-06 17:45:54
142.93.101.148 attackspambots
[PY]  (sshd) Failed SSH login from 142.93.101.148 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  6 04:00:33 svr sshd[3318119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148  user=root
Apr  6 04:00:36 svr sshd[3318119]: Failed password for root from 142.93.101.148 port 44544 ssh2
Apr  6 04:10:29 svr sshd[3321786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148  user=root
Apr  6 04:10:31 svr sshd[3321786]: Failed password for root from 142.93.101.148 port 45952 ssh2
Apr  6 04:14:01 svr sshd[3322972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148  user=root
2020-04-06 17:18:43
180.76.53.230 attackspam
Apr  6 06:09:42 mout sshd[16043]: Connection closed by 180.76.53.230 port 44567 [preauth]
2020-04-06 17:50:24
190.64.64.74 attackbots
Apr  6 15:42:16 itv-usvr-02 sshd[31278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.64.74  user=root
Apr  6 15:47:40 itv-usvr-02 sshd[31482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.64.74  user=root
Apr  6 15:50:28 itv-usvr-02 sshd[31620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.64.74  user=root
2020-04-06 17:29:42
60.246.3.31 attackbotsspam
(imapd) Failed IMAP login from 60.246.3.31 (MO/Macao/nz3l31.bb60246.ctm.net): 1 in the last 3600 secs
2020-04-06 17:42:48

Recently Reported IPs

160.77.116.161 16.71.236.115 27.94.27.226 238.8.170.230
124.35.173.7 243.246.99.114 17.175.99.212 145.52.157.112
174.253.207.253 87.168.66.148 89.161.140.52 178.99.225.42
148.34.105.140 153.197.128.217 33.203.181.2 20.247.135.77
152.178.21.5 20.156.147.247 205.91.62.205 176.186.31.110