Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.117.106.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29154
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.117.106.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020701 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 08 10:49:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
2.106.117.104.in-addr.arpa domain name pointer a104-117-106-2.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.106.117.104.in-addr.arpa	name = a104-117-106-2.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.220.102.4 attackspambots
detected by Fail2Ban
2019-07-04 15:40:41
107.170.192.236 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-07-04 16:02:34
177.92.144.90 attack
Jul  4 08:14:49 fr01 sshd[3868]: Invalid user ftp_user from 177.92.144.90
Jul  4 08:14:49 fr01 sshd[3868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.144.90
Jul  4 08:14:49 fr01 sshd[3868]: Invalid user ftp_user from 177.92.144.90
Jul  4 08:14:51 fr01 sshd[3868]: Failed password for invalid user ftp_user from 177.92.144.90 port 58314 ssh2
...
2019-07-04 16:09:22
142.0.135.153 attack
445/tcp 445/tcp 445/tcp
[2019-06-28/07-04]3pkt
2019-07-04 16:19:36
197.157.20.202 attack
19/7/4@03:37:11: FAIL: Alarm-Intrusion address from=197.157.20.202
19/7/4@03:37:11: FAIL: Alarm-Intrusion address from=197.157.20.202
...
2019-07-04 16:14:22
103.242.46.135 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=1571)(07041030)
2019-07-04 16:00:35
175.107.192.153 attackbots
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 2 time(s)]
*(RWIN=1024)(07041030)
2019-07-04 15:41:46
115.144.178.105 attack
445/tcp 445/tcp 445/tcp...
[2019-06-03/07-04]5pkt,1pt.(tcp)
2019-07-04 15:38:30
36.70.205.138 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 09:09:55,838 INFO [shellcode_manager] (36.70.205.138) no match, writing hexdump (548adf620150464616e25f2dc4c575ab :2162463) - MS17010 (EternalBlue)
2019-07-04 16:01:31
190.216.64.2 attackspam
Jul  4 08:15:14 mail postfix/smtpd\[27797\]: NOQUEUE: reject: RCPT from unknown\[190.216.64.2\]: 554 5.7.1 Service unavailable\; Client host \[190.216.64.2\] blocked using zen.spamhaus.org\; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/190.216.64.2\; from=\ to=\ proto=ESMTP helo=\<201-234-146-44.static.impsat.net.ar\>\
2019-07-04 15:54:56
217.17.103.203 attack
proto=tcp  .  spt=43815  .  dpt=25  .     (listed on Blocklist de  Jul 03)     (422)
2019-07-04 16:16:37
188.165.242.84 attack
proto=tcp  .  spt=38695  .  dpt=25  .     (listed on Blocklist de  Jul 03)     (436)
2019-07-04 15:44:05
157.92.26.222 attackbots
Jul  4 09:24:51 amit sshd\[25243\]: Invalid user connor from 157.92.26.222
Jul  4 09:24:51 amit sshd\[25243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.92.26.222
Jul  4 09:24:53 amit sshd\[25243\]: Failed password for invalid user connor from 157.92.26.222 port 33782 ssh2
...
2019-07-04 15:42:51
104.131.178.223 attackbotsspam
Jul  4 01:30:22 aat-srv002 sshd[1965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.178.223
Jul  4 01:30:25 aat-srv002 sshd[1965]: Failed password for invalid user murai2 from 104.131.178.223 port 41300 ssh2
Jul  4 01:32:33 aat-srv002 sshd[2000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.178.223
Jul  4 01:32:35 aat-srv002 sshd[2000]: Failed password for invalid user troy from 104.131.178.223 port 53876 ssh2
...
2019-07-04 16:07:29
101.109.113.26 attackspam
445/tcp 445/tcp 445/tcp...
[2019-05-30/07-04]5pkt,1pt.(tcp)
2019-07-04 15:34:44

Recently Reported IPs

189.44.68.81 57.50.116.217 59.40.44.6 255.255.255.250
107.67.197.170 101.237.129.80 38.22.93.227 49.235.101.208
103.108.190.244 142.87.175.253 213.195.6.134 170.64.86.103
76.43.215.146 176.124.203.208 223.113.152.162 125.166.233.80
114.153.77.54 180.209.82.74 75.179.226.150 211.202.207.195