Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Neuilly-sur-Seine

Region: Île-de-France

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.64.207.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.64.207.199.			IN	A

;; AUTHORITY SECTION:
.			342	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060100 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 18:19:37 CST 2020
;; MSG SIZE  rcvd: 118
Host info
199.207.64.104.in-addr.arpa domain name pointer a104-64-207-199.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.207.64.104.in-addr.arpa	name = a104-64-207-199.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.66.208.217 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-30 03:59:01
5.14.187.44 attackspambots
Automatic report - Port Scan Attack
2019-07-30 03:56:52
89.100.21.40 attackbotsspam
Jul 29 20:56:22 meumeu sshd[19382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40 
Jul 29 20:56:24 meumeu sshd[19382]: Failed password for invalid user 1a2m3p4 from 89.100.21.40 port 45814 ssh2
Jul 29 21:01:08 meumeu sshd[19947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40 
...
2019-07-30 04:10:14
188.166.72.240 attackbots
SSH Brute-Force reported by Fail2Ban
2019-07-30 04:13:36
123.206.71.71 attackspam
Jul 29 18:20:13 v11 sshd[3313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.71.71  user=r.r
Jul 29 18:20:16 v11 sshd[3313]: Failed password for r.r from 123.206.71.71 port 44270 ssh2
Jul 29 18:20:16 v11 sshd[3313]: Received disconnect from 123.206.71.71 port 44270:11: Bye Bye [preauth]
Jul 29 18:20:16 v11 sshd[3313]: Disconnected from 123.206.71.71 port 44270 [preauth]
Jul 29 18:42:34 v11 sshd[4345]: Invalid user song from 123.206.71.71 port 41578
Jul 29 18:42:36 v11 sshd[4345]: Failed password for invalid user song from 123.206.71.71 port 41578 ssh2
Jul 29 18:42:36 v11 sshd[4345]: Received disconnect from 123.206.71.71 port 41578:11: Bye Bye [preauth]
Jul 29 18:42:36 v11 sshd[4345]: Disconnected from 123.206.71.71 port 41578 [preauth]
Jul 29 18:45:31 v11 sshd[4473]: Invalid user sshuser from 123.206.71.71 port 37964
Jul 29 18:45:33 v11 sshd[4473]: Failed password for invalid user sshuser from 123.206.71.71 port 37964 ........
-------------------------------
2019-07-30 03:37:31
68.183.83.82 attackspam
2019-07-29T21:35:03.689746hz01.yumiweb.com sshd\[23746\]: Invalid user fake from 68.183.83.82 port 51318
2019-07-29T21:35:05.039352hz01.yumiweb.com sshd\[23751\]: Invalid user user from 68.183.83.82 port 52284
2019-07-29T21:35:06.325829hz01.yumiweb.com sshd\[23753\]: Invalid user ubnt from 68.183.83.82 port 53768
...
2019-07-30 03:46:04
195.208.122.32 attackbotsspam
failed_logins
2019-07-30 03:47:28
104.206.128.54 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-07-30 04:12:36
193.106.214.211 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-07-30 04:15:49
92.118.160.25 attackbots
29.07.2019 17:52:00 Connection to port 9200 blocked by firewall
2019-07-30 03:37:52
165.227.232.131 attackspam
Jul 29 20:59:15 mail sshd\[11301\]: Failed password for invalid user sshuser from 165.227.232.131 port 55370 ssh2
Jul 29 21:17:17 mail sshd\[11606\]: Invalid user pinguin29 from 165.227.232.131 port 41944
...
2019-07-30 04:19:17
18.85.192.253 attackbots
Jul 29 20:20:32 h2177944 sshd\[8826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.85.192.253  user=root
Jul 29 20:20:35 h2177944 sshd\[8826\]: Failed password for root from 18.85.192.253 port 60534 ssh2
Jul 29 20:20:37 h2177944 sshd\[8826\]: Failed password for root from 18.85.192.253 port 60534 ssh2
Jul 29 20:20:40 h2177944 sshd\[8826\]: Failed password for root from 18.85.192.253 port 60534 ssh2
...
2019-07-30 04:23:05
185.246.128.26 attackbotsspam
Jul 29 21:49:01 rpi sshd[18620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.128.26 
Jul 29 21:49:03 rpi sshd[18620]: Failed password for invalid user 0 from 185.246.128.26 port 32874 ssh2
2019-07-30 04:09:29
73.144.137.6 attackspam
Honeypot attack, port: 23, PTR: c-73-144-137-6.hsd1.mi.comcast.net.
2019-07-30 03:54:16
120.150.218.218 attackspambots
RDP Bruteforce
2019-07-30 04:17:04

Recently Reported IPs

214.113.124.110 121.240.118.140 79.127.44.14 192.169.129.181
80.28.130.38 212.144.77.98 97.236.135.55 184.41.43.248
217.226.151.122 113.160.133.173 185.96.221.34 134.76.118.23
215.40.213.181 49.153.239.172 84.180.151.215 210.239.94.211
90.113.60.250 103.108.187.98 204.156.192.215 109.141.82.112