Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.124.119.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.124.119.162.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:31:54 CST 2025
;; MSG SIZE  rcvd: 108
Host info
162.119.124.104.in-addr.arpa domain name pointer a104-124-119-162.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
162.119.124.104.in-addr.arpa	name = a104-124-119-162.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.70.186 attack
2020-06-30 07:57:33,633 fail2ban.actions        [937]: NOTICE  [sshd] Ban 139.59.70.186
2020-06-30 08:36:02,166 fail2ban.actions        [937]: NOTICE  [sshd] Ban 139.59.70.186
2020-06-30 09:14:01,723 fail2ban.actions        [937]: NOTICE  [sshd] Ban 139.59.70.186
2020-06-30 09:51:00,116 fail2ban.actions        [937]: NOTICE  [sshd] Ban 139.59.70.186
2020-06-30 10:26:51,383 fail2ban.actions        [937]: NOTICE  [sshd] Ban 139.59.70.186
...
2020-06-30 16:32:39
77.42.119.51 attackbotsspam
Port Scan detected!
...
2020-06-30 16:36:11
94.102.57.137 attack
Jun 30 10:53:38 debian-2gb-nbg1-2 kernel: \[15765857.042051\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.57.137 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=43394 PROTO=TCP SPT=50700 DPT=8450 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-30 17:13:15
103.10.55.163 attackspambots
06/30/2020-03:27:46.945793 103.10.55.163 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-30 16:39:00
139.186.8.212 attackbotsspam
Invalid user printer from 139.186.8.212 port 57404
2020-06-30 16:58:28
163.172.167.225 attackspambots
Jun 30 02:46:56 Tower sshd[34108]: Connection from 163.172.167.225 port 49062 on 192.168.10.220 port 22 rdomain ""
Jun 30 02:46:57 Tower sshd[34108]: Invalid user r00t from 163.172.167.225 port 49062
Jun 30 02:46:57 Tower sshd[34108]: error: Could not get shadow information for NOUSER
Jun 30 02:46:57 Tower sshd[34108]: Failed password for invalid user r00t from 163.172.167.225 port 49062 ssh2
Jun 30 02:46:57 Tower sshd[34108]: Received disconnect from 163.172.167.225 port 49062:11: Bye Bye [preauth]
Jun 30 02:46:57 Tower sshd[34108]: Disconnected from invalid user r00t 163.172.167.225 port 49062 [preauth]
2020-06-30 16:35:03
185.5.126.8 attackbots
Jun 30 06:18:22 vlre-nyc-1 sshd\[10826\]: Invalid user wgx from 185.5.126.8
Jun 30 06:18:22 vlre-nyc-1 sshd\[10826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.5.126.8
Jun 30 06:18:24 vlre-nyc-1 sshd\[10826\]: Failed password for invalid user wgx from 185.5.126.8 port 39497 ssh2
Jun 30 06:26:01 vlre-nyc-1 sshd\[11181\]: Invalid user sandra from 185.5.126.8
Jun 30 06:26:01 vlre-nyc-1 sshd\[11181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.5.126.8
...
2020-06-30 16:34:42
130.211.237.6 attack
Fail2Ban - SSH Bruteforce Attempt
2020-06-30 17:12:51
221.13.203.102 attackbotsspam
$f2bV_matches
2020-06-30 16:38:21
13.68.222.199 attack
sshd: Failed password for .... from 13.68.222.199 port 27939 ssh2 (5 attempts)
2020-06-30 17:18:42
36.61.135.19 attackspambots
06/30/2020-04:36:42.958219 36.61.135.19 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-30 17:02:42
134.209.97.42 attackspambots
Jun 30 11:28:40 lukav-desktop sshd\[10129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.42  user=root
Jun 30 11:28:42 lukav-desktop sshd\[10129\]: Failed password for root from 134.209.97.42 port 35514 ssh2
Jun 30 11:30:30 lukav-desktop sshd\[10175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.42  user=root
Jun 30 11:30:32 lukav-desktop sshd\[10175\]: Failed password for root from 134.209.97.42 port 33190 ssh2
Jun 30 11:32:28 lukav-desktop sshd\[10189\]: Invalid user temp from 134.209.97.42
2020-06-30 17:08:12
51.91.96.96 attackspam
Invalid user lab5 from 51.91.96.96 port 52186
2020-06-30 16:49:24
103.79.90.72 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-06-30 16:50:18
34.66.198.173 attackbotsspam
Jun 30 08:45:10 plex-server sshd[160910]: Invalid user couchdb from 34.66.198.173 port 38758
Jun 30 08:45:10 plex-server sshd[160910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.66.198.173 
Jun 30 08:45:10 plex-server sshd[160910]: Invalid user couchdb from 34.66.198.173 port 38758
Jun 30 08:45:12 plex-server sshd[160910]: Failed password for invalid user couchdb from 34.66.198.173 port 38758 ssh2
Jun 30 08:47:09 plex-server sshd[161030]: Invalid user tracyf from 34.66.198.173 port 43178
...
2020-06-30 17:03:05

Recently Reported IPs

5.11.142.190 150.35.96.140 132.183.17.17 240.228.107.117
130.1.86.140 124.241.99.69 61.59.148.40 243.214.4.188
46.62.198.179 38.46.62.60 237.54.208.247 99.49.235.238
106.52.163.43 209.14.64.30 171.163.150.67 214.163.53.59
203.135.6.62 130.14.171.252 139.21.226.221 124.4.220.164