Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.117.182.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.117.182.82.			IN	A

;; AUTHORITY SECTION:
.			212	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030302 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 11:45:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
82.182.117.104.in-addr.arpa domain name pointer a104-117-182-82.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.182.117.104.in-addr.arpa	name = a104-117-182-82.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.119.149.130 attack
08/07/2019-03:20:25.813987 85.119.149.130 Protocol: 6 ET SCAN Potential SSH Scan
2019-08-07 15:21:17
216.244.66.201 attack
20 attempts against mh-misbehave-ban on air.magehost.pro
2019-08-07 14:36:11
177.33.29.248 attackbotsspam
WordPress wp-login brute force :: 177.33.29.248 0.132 BYPASS [07/Aug/2019:17:04:09  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-07 15:10:47
159.224.3.95 attackbots
Unauthorized connection attempt from IP address 159.224.3.95 on Port 445(SMB)
2019-08-07 14:57:09
150.254.123.96 attack
Aug  7 09:04:14 icinga sshd[22415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.254.123.96
Aug  7 09:04:15 icinga sshd[22415]: Failed password for invalid user renuka from 150.254.123.96 port 53196 ssh2
...
2019-08-07 15:08:29
23.129.64.184 attackspambots
Autoban   23.129.64.184 AUTH/CONNECT
2019-08-07 14:34:53
129.213.153.229 attackspam
2019-08-06 20:13:14,967 fail2ban.actions        [791]: NOTICE  [sshd] Ban 129.213.153.229
2019-08-06 23:18:33,153 fail2ban.actions        [791]: NOTICE  [sshd] Ban 129.213.153.229
2019-08-07 02:23:03,168 fail2ban.actions        [791]: NOTICE  [sshd] Ban 129.213.153.229
...
2019-08-07 14:52:29
185.107.45.160 attack
NL - - [06 Aug 2019:23:45:39 +0300] GET  wordpress  HTTP 1.1 302 - - Mozilla 5.0 Windows NT 6.3; Win64; x64; rv:63.0 Gecko 20100101 Firefox 63.0
2019-08-07 15:11:42
185.220.101.44 attack
k+ssh-bruteforce
2019-08-07 15:11:22
37.187.122.195 attackbotsspam
Aug  7 08:18:28 microserver sshd[56034]: Invalid user murp from 37.187.122.195 port 36628
Aug  7 08:18:28 microserver sshd[56034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195
Aug  7 08:18:30 microserver sshd[56034]: Failed password for invalid user murp from 37.187.122.195 port 36628 ssh2
Aug  7 08:23:35 microserver sshd[56748]: Invalid user cesar from 37.187.122.195 port 60744
Aug  7 08:23:35 microserver sshd[56748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195
Aug  7 08:33:39 microserver sshd[3541]: Invalid user test from 37.187.122.195 port 52442
Aug  7 08:33:39 microserver sshd[3541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195
Aug  7 08:33:41 microserver sshd[3541]: Failed password for invalid user test from 37.187.122.195 port 52442 ssh2
Aug  7 08:38:47 microserver sshd[4940]: Invalid user timemachine from 37.187.122.195 port 4823
2019-08-07 14:44:41
195.3.245.178 attackspam
[portscan] Port scan
2019-08-07 15:18:07
45.119.83.238 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-08-07 14:27:11
185.69.153.247 attackbots
Aug  7 08:26:55 meumeu sshd[31964]: Failed password for invalid user paps from 185.69.153.247 port 49788 ssh2
Aug  7 08:31:38 meumeu sshd[32485]: Failed password for invalid user bai from 185.69.153.247 port 46762 ssh2
...
2019-08-07 14:37:51
144.217.89.55 attackbots
<6 unauthorized SSH connections
2019-08-07 15:25:43
212.92.121.187 attackspam
RDP Bruteforce
2019-08-07 15:13:22

Recently Reported IPs

104.110.208.191 104.114.72.200 104.118.128.101 104.112.154.24
104.123.196.83 104.123.38.100 104.123.36.122 104.123.196.64
104.124.105.9 112.66.108.124 104.124.105.81 104.125.12.133
104.114.72.195 112.66.108.126 112.66.108.155 104.130.138.204
104.130.158.187 104.130.201.219 104.130.127.194 104.129.60.10