Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Piscataway

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.66.239.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.66.239.5.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040901 1800 900 604800 86400

;; Query time: 185 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 10 06:15:40 CST 2022
;; MSG SIZE  rcvd: 105
Host info
5.239.66.104.in-addr.arpa domain name pointer a104-66-239-5.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.239.66.104.in-addr.arpa	name = a104-66-239-5.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.99.75.141 attack
Invalid user kagiyama from 167.99.75.141 port 55796
2019-12-15 03:56:27
62.212.230.38 attackspam
Port 1433 Scan
2019-12-15 03:54:38
89.248.160.193 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 6019 proto: TCP cat: Misc Attack
2019-12-15 03:44:15
123.207.5.190 attack
Invalid user siti from 123.207.5.190 port 39842
2019-12-15 03:41:02
157.230.128.195 attack
firewall-block, port(s): 10546/tcp
2019-12-15 03:54:17
83.240.245.242 attack
Dec 14 09:29:06 eddieflores sshd\[21081\]: Invalid user duvarci from 83.240.245.242
Dec 14 09:29:06 eddieflores sshd\[21081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.240.245.242
Dec 14 09:29:08 eddieflores sshd\[21081\]: Failed password for invalid user duvarci from 83.240.245.242 port 34890 ssh2
Dec 14 09:34:46 eddieflores sshd\[21564\]: Invalid user pnjeri from 83.240.245.242
Dec 14 09:34:46 eddieflores sshd\[21564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.240.245.242
2019-12-15 04:09:01
36.66.56.234 attackbots
SSH Brute Force
2019-12-15 03:48:20
113.173.100.161 attackspambots
Dec 15 00:58:33 our-server-hostname postfix/smtpd[14264]: connect from unknown[113.173.100.161]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.173.100.161
2019-12-15 04:08:42
113.172.117.197 attackbotsspam
Dec 15 00:54:34 our-server-hostname postfix/smtpd[8799]: connect from unknown[113.172.117.197]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.172.117.197
2019-12-15 03:46:28
68.183.162.154 attackspam
Dec 14 15:53:41 legacy sshd[5335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.162.154
Dec 14 15:53:43 legacy sshd[5335]: Failed password for invalid user charlotte123 from 68.183.162.154 port 39198 ssh2
Dec 14 15:59:41 legacy sshd[5598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.162.154
...
2019-12-15 03:51:29
87.218.252.61 attackspam
ENG,WP GET /wp-login.php
2019-12-15 03:49:38
200.108.143.6 attack
Dec 14 07:37:00 sachi sshd\[1551\]: Invalid user root123 from 200.108.143.6
Dec 14 07:37:00 sachi sshd\[1551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
Dec 14 07:37:03 sachi sshd\[1551\]: Failed password for invalid user root123 from 200.108.143.6 port 54936 ssh2
Dec 14 07:44:04 sachi sshd\[2298\]: Invalid user albrand from 200.108.143.6
Dec 14 07:44:04 sachi sshd\[2298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
2019-12-15 03:37:36
201.48.65.147 attackspam
$f2bV_matches
2019-12-15 03:37:14
194.219.194.136 attack
port 23
2019-12-15 04:07:40
171.103.57.154 attackbots
Dec 15 00:56:04 our-server-hostname postfix/smtpd[8408]: connect from unknown[171.103.57.154]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=171.103.57.154
2019-12-15 03:54:02

Recently Reported IPs

104.66.237.176 104.66.243.49 104.67.3.145 104.67.3.194
104.68.124.177 104.68.246.46 104.68.247.111 104.69.218.88
104.70.121.25 104.70.121.43 104.71.181.113 64.122.88.116
104.71.184.121 104.71.186.60 104.71.218.11 104.71.218.66
104.73.67.69 104.74.65.136 104.74.65.178 104.74.65.179