Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: Akamai Technologies, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.123.107.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29657
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.123.107.242.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070200 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 03 01:29:44 CST 2019
;; MSG SIZE  rcvd: 119
Host info
242.107.123.104.in-addr.arpa domain name pointer a104-123-107-242.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
242.107.123.104.in-addr.arpa	name = a104-123-107-242.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.54.141.8 attackspam
Jan  4 07:31:12 server sshd\[13882\]: Invalid user ts from 106.54.141.8
Jan  4 07:31:12 server sshd\[13882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.8 
Jan  4 07:31:14 server sshd\[13882\]: Failed password for invalid user ts from 106.54.141.8 port 41784 ssh2
Jan  4 07:53:51 server sshd\[18781\]: Invalid user steamuser from 106.54.141.8
Jan  4 07:53:51 server sshd\[18781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.8 
...
2020-01-04 15:04:43
34.83.122.113 attackspam
SSH Scan
2020-01-04 15:17:39
46.38.144.146 attackspam
Jan  4 08:39:07 vmanager6029 postfix/smtpd\[5162\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  4 08:39:36 vmanager6029 postfix/smtpd\[5291\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-04 15:40:32
117.50.95.121 attack
Jan  4 07:53:03 plex sshd[1540]: Invalid user zxcv from 117.50.95.121 port 60640
2020-01-04 15:07:30
72.140.179.204 attack
Jan  4 06:57:27 srv206 sshd[4811]: Invalid user MC from 72.140.179.204
Jan  4 06:57:27 srv206 sshd[4811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe84948c4a2483-cm84948c4a2480.cpe.net.fido.ca
Jan  4 06:57:27 srv206 sshd[4811]: Invalid user MC from 72.140.179.204
Jan  4 06:57:30 srv206 sshd[4811]: Failed password for invalid user MC from 72.140.179.204 port 38214 ssh2
...
2020-01-04 15:18:58
184.179.216.156 attackbots
B: Magento admin pass test (wrong country)
2020-01-04 15:39:21
182.61.105.127 attackbotsspam
Jan  4 05:54:23 ip-172-31-62-245 sshd\[7812\]: Invalid user jacky from 182.61.105.127\
Jan  4 05:54:25 ip-172-31-62-245 sshd\[7812\]: Failed password for invalid user jacky from 182.61.105.127 port 43066 ssh2\
Jan  4 05:57:59 ip-172-31-62-245 sshd\[7878\]: Invalid user mz from 182.61.105.127\
Jan  4 05:58:00 ip-172-31-62-245 sshd\[7878\]: Failed password for invalid user mz from 182.61.105.127 port 47120 ssh2\
Jan  4 06:01:32 ip-172-31-62-245 sshd\[7916\]: Invalid user bernardo from 182.61.105.127\
2020-01-04 15:00:34
49.88.112.59 attackbotsspam
2020-01-04T08:18:28.620632vps751288.ovh.net sshd\[31037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.59  user=root
2020-01-04T08:18:30.538787vps751288.ovh.net sshd\[31037\]: Failed password for root from 49.88.112.59 port 64727 ssh2
2020-01-04T08:18:33.454959vps751288.ovh.net sshd\[31037\]: Failed password for root from 49.88.112.59 port 64727 ssh2
2020-01-04T08:18:37.444219vps751288.ovh.net sshd\[31037\]: Failed password for root from 49.88.112.59 port 64727 ssh2
2020-01-04T08:18:42.950717vps751288.ovh.net sshd\[31037\]: Failed password for root from 49.88.112.59 port 64727 ssh2
2020-01-04 15:27:59
182.176.91.245 attackbots
Jan  4 05:53:15 [host] sshd[1533]: Invalid user suy from 182.176.91.245
Jan  4 05:53:15 [host] sshd[1533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.176.91.245
Jan  4 05:53:17 [host] sshd[1533]: Failed password for invalid user suy from 182.176.91.245 port 33936 ssh2
2020-01-04 15:23:48
87.91.180.21 attack
Jan  4 06:45:16 lukav-desktop sshd\[11017\]: Invalid user kez from 87.91.180.21
Jan  4 06:45:16 lukav-desktop sshd\[11017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.91.180.21
Jan  4 06:45:18 lukav-desktop sshd\[11017\]: Failed password for invalid user kez from 87.91.180.21 port 51087 ssh2
Jan  4 06:52:43 lukav-desktop sshd\[5618\]: Invalid user uhu from 87.91.180.21
Jan  4 06:52:43 lukav-desktop sshd\[5618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.91.180.21
2020-01-04 15:40:58
180.76.102.136 attack
Invalid user admin from 180.76.102.136 port 50938
2020-01-04 15:20:15
68.183.236.29 attack
...
2020-01-04 15:41:54
182.61.160.253 attackbotsspam
2020-01-04T18:03:23.098443luisaranguren sshd[1106154]: Connection from 182.61.160.253 port 53470 on 10.10.10.6 port 22 rdomain ""
2020-01-04T18:03:23.946977luisaranguren sshd[1106154]: Invalid user ftp_test from 182.61.160.253 port 53470
2020-01-04T18:03:23.960448luisaranguren sshd[1106154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.160.253
2020-01-04T18:03:23.098443luisaranguren sshd[1106154]: Connection from 182.61.160.253 port 53470 on 10.10.10.6 port 22 rdomain ""
2020-01-04T18:03:23.946977luisaranguren sshd[1106154]: Invalid user ftp_test from 182.61.160.253 port 53470
2020-01-04T18:03:25.973767luisaranguren sshd[1106154]: Failed password for invalid user ftp_test from 182.61.160.253 port 53470 ssh2
...
2020-01-04 15:06:14
122.179.136.22 attackbots
Unauthorised access (Jan  4) SRC=122.179.136.22 LEN=48 TTL=119 ID=27174 DF TCP DPT=1433 WINDOW=8192 SYN
2020-01-04 15:33:38
223.241.78.126 attack
Jan  4 05:52:50 grey postfix/smtpd\[11909\]: NOQUEUE: reject: RCPT from unknown\[223.241.78.126\]: 554 5.7.1 Service unavailable\; Client host \[223.241.78.126\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?223.241.78.126\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-04 15:37:12

Recently Reported IPs

130.37.192.30 164.92.119.134 117.92.16.238 180.129.99.13
220.41.71.36 139.59.95.244 126.61.50.17 183.239.183.117
214.254.143.255 100.187.21.164 37.65.225.156 174.63.106.111
178.225.209.245 159.65.43.188 221.252.233.219 128.101.12.142
211.193.177.131 74.51.131.136 120.169.86.120 206.189.181.12