Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.127.2.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.127.2.48.			IN	A

;; AUTHORITY SECTION:
.			12	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:02:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
48.2.127.104.in-addr.arpa domain name pointer a104-127-2-48.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.2.127.104.in-addr.arpa	name = a104-127-2-48.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.45.114.75 attackspambots
postfix-failedauth jail [ma]
2019-08-24 18:43:07
219.223.236.125 attackbots
Aug 24 11:25:57 cp sshd[23626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.223.236.125
2019-08-24 19:02:21
115.238.62.154 attack
SSH Brute Force, server-1 sshd[20022]: Failed password for invalid user ajay from 115.238.62.154 port 46080 ssh2
2019-08-24 18:16:18
80.234.44.81 attackspam
Invalid user brown from 80.234.44.81 port 57352
2019-08-24 18:55:00
218.92.0.187 attack
Aug 24 12:05:46 ArkNodeAT sshd\[21563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.187  user=root
Aug 24 12:05:48 ArkNodeAT sshd\[21563\]: Failed password for root from 218.92.0.187 port 17770 ssh2
Aug 24 12:06:06 ArkNodeAT sshd\[21571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.187  user=root
2019-08-24 18:52:23
54.37.154.113 attack
Aug 24 12:14:54 SilenceServices sshd[10687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.113
Aug 24 12:14:56 SilenceServices sshd[10687]: Failed password for invalid user ali from 54.37.154.113 port 53724 ssh2
Aug 24 12:18:46 SilenceServices sshd[13746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.113
2019-08-24 18:33:38
173.14.28.193 attackspambots
TCP src-port=53846   dst-port=25    spam-sorbs         (118)
2019-08-24 18:57:10
103.23.153.184 attackbotsspam
TCP src-port=41044   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (124)
2019-08-24 18:36:46
45.55.15.134 attack
web-1 [ssh] SSH Attack
2019-08-24 18:57:39
149.56.129.68 attackbotsspam
Aug 24 03:29:38 [munged] sshd[11972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.129.68  user=mail
Aug 24 03:29:40 [munged] sshd[11972]: Failed password for mail from 149.56.129.68 port 45486 ssh2
2019-08-24 18:15:44
106.52.217.229 attack
Aug 24 12:03:40 dev0-dcde-rnet sshd[14533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.217.229
Aug 24 12:03:43 dev0-dcde-rnet sshd[14533]: Failed password for invalid user bill from 106.52.217.229 port 40462 ssh2
Aug 24 12:06:22 dev0-dcde-rnet sshd[14536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.217.229
2019-08-24 19:03:51
95.181.200.143 attack
TCP src-port=42890   dst-port=25    dnsbl-sorbs abuseat-org spamcop         (116)
2019-08-24 19:03:31
95.247.11.1 attackbots
2019-08-24T10:10:33.739940abusebot-4.cloudsearch.cf sshd\[3761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host1-11-dynamic.247-95-r.retail.telecomitalia.it  user=root
2019-08-24 18:42:29
104.217.253.242 attackspam
Aug 24 05:55:34 rpi sshd[31366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.217.253.242 
Aug 24 05:55:36 rpi sshd[31366]: Failed password for invalid user patricia from 104.217.253.242 port 34076 ssh2
2019-08-24 19:04:19
42.104.97.238 attack
Aug 24 01:57:03 ny01 sshd[27057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.238
Aug 24 01:57:05 ny01 sshd[27057]: Failed password for invalid user vin from 42.104.97.238 port 38843 ssh2
Aug 24 02:01:00 ny01 sshd[27615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.238
2019-08-24 18:58:11

Recently Reported IPs

104.127.178.244 104.127.64.175 104.128.228.92 104.22.14.192
104.128.234.176 104.128.145.83 104.128.145.73 104.128.101.79
104.22.14.193 104.22.14.199 104.22.14.20 104.22.14.201
255.4.160.160 104.22.14.210 104.22.14.228 104.131.55.174
104.131.52.100 104.131.57.193 104.131.12.156 104.22.14.35