Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.126.116.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.126.116.16.			IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 02:43:30 CST 2022
;; MSG SIZE  rcvd: 107
Host info
16.116.126.104.in-addr.arpa domain name pointer a104-126-116-16.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.116.126.104.in-addr.arpa	name = a104-126-116-16.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.118.38.38 attackbots
Dec  3 11:37:40 webserver postfix/smtpd\[8799\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  3 11:38:15 webserver postfix/smtpd\[8799\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  3 11:38:47 webserver postfix/smtpd\[8799\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  3 11:39:25 webserver postfix/smtpd\[8799\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  3 11:39:59 webserver postfix/smtpd\[8799\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-03 18:45:55
193.112.52.105 attack
Dec  3 09:00:24 vps647732 sshd[28308]: Failed password for root from 193.112.52.105 port 54408 ssh2
...
2019-12-03 18:55:59
121.132.145.31 attackbotsspam
Lines containing failures of 121.132.145.31
Dec  2 17:23:38 cdb sshd[5342]: Invalid user rajfur from 121.132.145.31 port 35280
Dec  2 17:23:38 cdb sshd[5342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.145.31
Dec  2 17:23:40 cdb sshd[5342]: Failed password for invalid user rajfur from 121.132.145.31 port 35280 ssh2
Dec  2 17:23:41 cdb sshd[5342]: Received disconnect from 121.132.145.31 port 35280:11: Bye Bye [preauth]
Dec  2 17:23:41 cdb sshd[5342]: Disconnected from invalid user rajfur 121.132.145.31 port 35280 [preauth]
Dec  2 17:33:18 cdb sshd[6543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.145.31  user=r.r
Dec  2 17:33:21 cdb sshd[6543]: Failed password for r.r from 121.132.145.31 port 44992 ssh2
Dec  2 17:33:21 cdb sshd[6543]: Received disconnect from 121.132.145.31 port 44992:11: Bye Bye [preauth]
Dec  2 17:33:21 cdb sshd[6543]: Disconnected from authenticati........
------------------------------
2019-12-03 19:02:09
222.186.180.8 attack
SSHScan
2019-12-03 19:03:59
144.217.91.86 attackbotsspam
2019-12-03T10:45:18.464961vps751288.ovh.net sshd\[12196\]: Invalid user test from 144.217.91.86 port 37290
2019-12-03T10:45:18.479101vps751288.ovh.net sshd\[12196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86
2019-12-03T10:45:20.303460vps751288.ovh.net sshd\[12196\]: Failed password for invalid user test from 144.217.91.86 port 37290 ssh2
2019-12-03T10:50:48.913319vps751288.ovh.net sshd\[12254\]: Invalid user cron from 144.217.91.86 port 48212
2019-12-03T10:50:48.925236vps751288.ovh.net sshd\[12254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86
2019-12-03 18:59:27
103.255.101.166 attack
$f2bV_matches
2019-12-03 18:58:16
49.234.30.113 attack
Dec  3 09:11:37 server sshd\[25623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.113  user=dovecot
Dec  3 09:11:39 server sshd\[25623\]: Failed password for dovecot from 49.234.30.113 port 39914 ssh2
Dec  3 09:25:34 server sshd\[29387\]: Invalid user home from 49.234.30.113
Dec  3 09:25:34 server sshd\[29387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.113 
Dec  3 09:25:36 server sshd\[29387\]: Failed password for invalid user home from 49.234.30.113 port 39579 ssh2
...
2019-12-03 19:09:12
37.49.230.81 attackbots
\[2019-12-03 05:49:10\] NOTICE\[2754\] chan_sip.c: Registration from '"608" \' failed for '37.49.230.81:5724' - Wrong password
\[2019-12-03 05:49:10\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-03T05:49:10.808-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="608",SessionID="0x7f26c4276ea8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.81/5724",Challenge="43d3540e",ReceivedChallenge="43d3540e",ReceivedHash="f6d940cdeeb5c9cb0fe60f731b89189f"
\[2019-12-03 05:49:10\] NOTICE\[2754\] chan_sip.c: Registration from '"608" \' failed for '37.49.230.81:5724' - Wrong password
\[2019-12-03 05:49:10\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-03T05:49:10.940-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="608",SessionID="0x7f26c4022278",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.2
2019-12-03 19:23:20
222.186.180.17 attackspam
Dec  3 01:12:30 hanapaa sshd\[1722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Dec  3 01:12:32 hanapaa sshd\[1722\]: Failed password for root from 222.186.180.17 port 49852 ssh2
Dec  3 01:12:47 hanapaa sshd\[1745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Dec  3 01:12:49 hanapaa sshd\[1745\]: Failed password for root from 222.186.180.17 port 59370 ssh2
Dec  3 01:13:08 hanapaa sshd\[1782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
2019-12-03 19:18:36
145.239.64.8 attackspam
145.239.64.8 - - \[03/Dec/2019:10:25:32 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.64.8 - - \[03/Dec/2019:10:25:33 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-12-03 18:48:13
180.76.242.171 attack
Dec  3 11:47:21 legacy sshd[14723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.242.171
Dec  3 11:47:23 legacy sshd[14723]: Failed password for invalid user password from 180.76.242.171 port 35162 ssh2
Dec  3 11:54:06 legacy sshd[14998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.242.171
...
2019-12-03 19:13:43
51.83.77.224 attack
Dec  3 00:59:49 hanapaa sshd\[357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=224.ip-51-83-77.eu  user=root
Dec  3 00:59:51 hanapaa sshd\[357\]: Failed password for root from 51.83.77.224 port 35396 ssh2
Dec  3 01:05:11 hanapaa sshd\[911\]: Invalid user lula from 51.83.77.224
Dec  3 01:05:11 hanapaa sshd\[911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=224.ip-51-83-77.eu
Dec  3 01:05:12 hanapaa sshd\[911\]: Failed password for invalid user lula from 51.83.77.224 port 46122 ssh2
2019-12-03 19:10:52
203.195.244.80 attackbotsspam
Dec  3 02:34:45 home sshd[7597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.244.80  user=daemon
Dec  3 02:34:47 home sshd[7597]: Failed password for daemon from 203.195.244.80 port 60644 ssh2
Dec  3 02:42:40 home sshd[7701]: Invalid user guest from 203.195.244.80 port 46560
Dec  3 02:42:40 home sshd[7701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.244.80
Dec  3 02:42:40 home sshd[7701]: Invalid user guest from 203.195.244.80 port 46560
Dec  3 02:42:41 home sshd[7701]: Failed password for invalid user guest from 203.195.244.80 port 46560 ssh2
Dec  3 02:59:05 home sshd[7943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.244.80  user=root
Dec  3 02:59:07 home sshd[7943]: Failed password for root from 203.195.244.80 port 44856 ssh2
Dec  3 03:09:48 home sshd[8044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195
2019-12-03 19:05:52
222.186.173.154 attackbotsspam
2019-12-03T10:48:31.850242hub.schaetter.us sshd\[16261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2019-12-03T10:48:33.719588hub.schaetter.us sshd\[16261\]: Failed password for root from 222.186.173.154 port 42850 ssh2
2019-12-03T10:48:37.568018hub.schaetter.us sshd\[16261\]: Failed password for root from 222.186.173.154 port 42850 ssh2
2019-12-03T10:48:40.959610hub.schaetter.us sshd\[16261\]: Failed password for root from 222.186.173.154 port 42850 ssh2
2019-12-03T10:48:43.903633hub.schaetter.us sshd\[16261\]: Failed password for root from 222.186.173.154 port 42850 ssh2
...
2019-12-03 18:51:16
80.17.244.2 attack
Dec  3 11:37:36 MK-Soft-VM8 sshd[16856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.17.244.2 
Dec  3 11:37:39 MK-Soft-VM8 sshd[16856]: Failed password for invalid user hung from 80.17.244.2 port 48282 ssh2
...
2019-12-03 19:02:32

Recently Reported IPs

104.126.116.105 104.126.116.193 104.126.116.203 104.126.116.40
104.126.116.41 104.126.116.51 104.126.116.64 104.126.116.98
104.126.117.24 131.69.98.140 104.126.117.27 104.126.117.43
214.103.52.52 104.126.118.75 104.126.118.82 104.127.160.109
104.127.161.168 104.127.161.244 104.127.162.10 104.127.162.96