Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Milan

Region: Lombardy

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.120.97.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63184
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.120.97.239.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 08 13:30:12 CST 2023
;; MSG SIZE  rcvd: 107
Host info
239.97.120.104.in-addr.arpa domain name pointer a104-120-97-239.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.97.120.104.in-addr.arpa	name = a104-120-97-239.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.70.23.131 attackbotsspam
Sep  2 22:35:28 saschabauer sshd[18814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.131
Sep  2 22:35:30 saschabauer sshd[18814]: Failed password for invalid user admin from 148.70.23.131 port 52483 ssh2
2019-09-03 06:36:07
42.56.110.120 attack
8080
2019-09-03 06:56:36
125.160.248.119 attack
Looking for /backupsite.sql, Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-09-03 06:36:47
120.52.96.216 attackbots
Sep  2 23:48:41 nextcloud sshd\[22060\]: Invalid user ubnt from 120.52.96.216
Sep  2 23:48:41 nextcloud sshd\[22060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.96.216
Sep  2 23:48:43 nextcloud sshd\[22060\]: Failed password for invalid user ubnt from 120.52.96.216 port 35267 ssh2
...
2019-09-03 06:28:20
103.209.144.199 attack
WordPress login Brute force / Web App Attack on client site.
2019-09-03 06:39:23
186.93.110.143 attackspam
445/tcp
[2019-09-02]1pkt
2019-09-03 06:44:43
144.76.152.182 attackspam
Sep  2 08:28:08 our-server-hostname postfix/smtpd[21819]: connect from unknown[144.76.152.182]
Sep x@x
Sep  2 08:28:09 our-server-hostname postfix/smtpd[21819]: lost connection after RCPT from unknown[144.76.152.182]
Sep  2 08:28:09 our-server-hostname postfix/smtpd[21819]: disconnect from unknown[144.76.152.182]
Sep  2 08:56:53 our-server-hostname postfix/smtpd[22032]: connect from unknown[144.76.152.182]
Sep  2 08:56:54 our-server-hostname postfix/smtpd[22032]: NOQUEUE: reject: RCPT from unknown[144.76.152.182]: 554 5.7.1 Service unavailable; Client host [144.76.152.182] block
.... truncated .... 
ix/smtpd[22143]: lost connection after RCPT from unknown[144.76.152.182]
Sep  2 18:18:11 our-server-hostname postfix/smtpd[22143]: disconnect from unknown[144.76.152.182]
Sep  2 18:20:23 our-server-hostname postfix/smtpd[2815]: connect from unknown[144.76.152.182]
Sep x@x
Sep  2 18:20:24 our-server-hostname postfix/smtpd[2815]: lost connection after RCPT from unknown[144.76.........
-------------------------------
2019-09-03 06:52:17
119.237.245.253 attack
23/tcp
[2019-09-02]1pkt
2019-09-03 06:26:13
157.230.7.0 attack
Sep  2 21:41:01 bouncer sshd\[16636\]: Invalid user ftp from 157.230.7.0 port 50358
Sep  2 21:41:01 bouncer sshd\[16636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.7.0 
Sep  2 21:41:04 bouncer sshd\[16636\]: Failed password for invalid user ftp from 157.230.7.0 port 50358 ssh2
...
2019-09-03 06:58:53
177.69.44.193 attackbots
Sep  2 09:40:29 web9 sshd\[15877\]: Invalid user ts3 from 177.69.44.193
Sep  2 09:40:29 web9 sshd\[15877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.44.193
Sep  2 09:40:32 web9 sshd\[15877\]: Failed password for invalid user ts3 from 177.69.44.193 port 36091 ssh2
Sep  2 09:45:46 web9 sshd\[16891\]: Invalid user ubuntu from 177.69.44.193
Sep  2 09:45:46 web9 sshd\[16891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.44.193
2019-09-03 06:29:23
112.85.42.89 attack
Sep  3 01:31:08 server sshd\[2863\]: User root from 112.85.42.89 not allowed because listed in DenyUsers
Sep  3 01:31:08 server sshd\[2863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Sep  3 01:31:11 server sshd\[2863\]: Failed password for invalid user root from 112.85.42.89 port 11204 ssh2
Sep  3 01:31:14 server sshd\[2863\]: Failed password for invalid user root from 112.85.42.89 port 11204 ssh2
Sep  3 01:31:17 server sshd\[2863\]: Failed password for invalid user root from 112.85.42.89 port 11204 ssh2
2019-09-03 06:41:53
117.192.19.145 attackbotsspam
Automatic report - Port Scan Attack
2019-09-03 06:37:02
167.71.217.110 attackspam
Sep  2 19:46:11 OPSO sshd\[7778\]: Invalid user internat123 from 167.71.217.110 port 37928
Sep  2 19:46:11 OPSO sshd\[7778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.110
Sep  2 19:46:13 OPSO sshd\[7778\]: Failed password for invalid user internat123 from 167.71.217.110 port 37928 ssh2
Sep  2 19:50:41 OPSO sshd\[8481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.110  user=root
Sep  2 19:50:43 OPSO sshd\[8481\]: Failed password for root from 167.71.217.110 port 39432 ssh2
2019-09-03 06:49:48
213.87.198.193 attackbots
Port scan on 1 port(s): 3389
2019-09-03 06:21:12
170.81.164.157 attackspambots
Automatic report - Port Scan Attack
2019-09-03 06:54:58

Recently Reported IPs

135.24.176.68 103.231.91.70 103.157.235.240 83.235.136.130
16.167.149.107 225.116.90.41 115.134.41.7 198.232.52.11
159.210.190.219 60.18.32.118 144.10.190.180 111.74.239.61
86.39.6.147 69.153.214.182 233.210.164.252 101.229.62.225
101.118.228.196 100.75.108.30 100.22.69.27 100.220.225.71