Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: Evolve Broadband

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       104.202.0.0 - 104.202.127.255
CIDR:           104.202.0.0/17
NetName:        WAVEB
NetHandle:      NET-104-202-0-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Wave Broadband (WAVEB)
RegDate:        2021-02-02
Updated:        2026-02-09
Comment:        Geofeed https://as11404.net/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/104.202.0.0


OrgName:        Wave Broadband
OrgId:          WAVEB
Address:        650 College Road East
City:           Princeton
StateProv:      NJ
PostalCode:     08540
Country:        US
RegDate:        2003-05-19
Updated:        2025-10-31
Ref:            https://rdap.arin.net/registry/entity/WAVEB


OrgNOCHandle: ABN3-ARIN
OrgNOCName:   Astound Broadband NOC
OrgNOCPhone:  +1-888-972-6622 
OrgNOCEmail:  noc@astound.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ABN3-ARIN

OrgTechHandle: IAT18-ARIN
OrgTechName:   IP admin team
OrgTechPhone:  +1-888-972-6622 
OrgTechEmail:  arin@wavebroadband.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IAT18-ARIN

OrgAbuseHandle: ABN3-ARIN
OrgAbuseName:   Astound Broadband NOC
OrgAbusePhone:  +1-888-972-6622 
OrgAbuseEmail:  noc@astound.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABN3-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.202.107.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.202.107.244.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050200 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 15:40:03 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 244.107.202.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.107.202.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.52.43.89 attackspambots
firewall-block, port(s): 993/tcp
2019-09-14 21:18:31
111.230.54.226 attackbots
Automated report - ssh fail2ban:
Sep 14 14:20:19 authentication failure 
Sep 14 14:20:21 wrong password, user=hu, port=36518, ssh2
Sep 14 14:25:51 authentication failure
2019-09-14 20:39:34
130.61.121.78 attackbots
Sep 14 14:31:10 rpi sshd[28940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.121.78 
Sep 14 14:31:12 rpi sshd[28940]: Failed password for invalid user pgbouncer from 130.61.121.78 port 34954 ssh2
2019-09-14 20:34:17
162.144.134.39 attack
WordPress login Brute force / Web App Attack on client site.
2019-09-14 21:19:48
222.186.31.144 attack
Sep 14 18:34:44 areeb-Workstation sshd[19960]: Failed password for root from 222.186.31.144 port 55420 ssh2
Sep 14 18:34:46 areeb-Workstation sshd[19960]: Failed password for root from 222.186.31.144 port 55420 ssh2
...
2019-09-14 21:06:31
144.217.209.249 attackspambots
Sep 10 20:05:03 itv-usvr-01 sshd[5812]: Invalid user support from 144.217.209.249
Sep 10 20:05:03 itv-usvr-01 sshd[5812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.209.249
Sep 10 20:05:03 itv-usvr-01 sshd[5812]: Invalid user support from 144.217.209.249
Sep 10 20:05:05 itv-usvr-01 sshd[5812]: Failed password for invalid user support from 144.217.209.249 port 34880 ssh2
Sep 10 20:10:41 itv-usvr-01 sshd[6117]: Invalid user test from 144.217.209.249
2019-09-14 21:16:11
121.35.170.165 attackbotsspam
SSH invalid-user multiple login try
2019-09-14 21:26:03
201.22.175.64 attack
Sep 14 08:47:58 [munged] sshd[31577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.175.64
2019-09-14 20:40:31
190.190.157.61 attackspam
port 23 attempt blocked
2019-09-14 20:58:57
140.246.39.128 attack
Tried sshing with brute force.
2019-09-14 21:20:21
138.197.162.32 attackbotsspam
Sep 14 09:33:07 vmd17057 sshd\[22970\]: Invalid user www-data1 from 138.197.162.32 port 36680
Sep 14 09:33:07 vmd17057 sshd\[22970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.32
Sep 14 09:33:09 vmd17057 sshd\[22970\]: Failed password for invalid user www-data1 from 138.197.162.32 port 36680 ssh2
...
2019-09-14 20:49:13
106.75.74.6 attack
$f2bV_matches
2019-09-14 21:05:06
27.34.55.45 attackspambots
2019-09-14T06:47:32.051095abusebot-2.cloudsearch.cf sshd\[11397\]: Invalid user admin from 27.34.55.45 port 43348
2019-09-14 21:06:11
190.144.135.118 attackbots
Sep 14 13:40:23 dev0-dcfr-rnet sshd[24646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.135.118
Sep 14 13:40:25 dev0-dcfr-rnet sshd[24646]: Failed password for invalid user oracle!@# from 190.144.135.118 port 44150 ssh2
Sep 14 13:44:20 dev0-dcfr-rnet sshd[24661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.135.118
2019-09-14 21:27:39
185.176.27.42 attack
Port scan: Attack repeated for 24 hours
2019-09-14 20:31:58

Recently Reported IPs

134.35.157.182 147.185.133.18 161.248.116.1 190.194.63.241
34.38.101.111 192.71.126.245 2606:4700:10::6814:5594 2606:4700:10::6816:4423
2606:4700:10::6814:6623 192.204.43.177 154.210.190.179 62.152.58.104
188.127.231.221 91.219.150.70 45.89.27.33 2606:4700:10::6814:7240
2606:4700:10::6816:3381 2606:4700:10::ac43:2346 2606:4700:10::6816:388 216.36.85.227