Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.71.143.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42213
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.71.143.139.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 15:48:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
139.143.71.104.in-addr.arpa domain name pointer a104-71-143-139.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.143.71.104.in-addr.arpa	name = a104-71-143-139.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
40.73.32.209 attackspambots
Invalid user cacti from 40.73.32.209 port 36236
2020-01-29 09:30:13
217.9.92.34 attackspam
$f2bV_matches
2020-01-29 09:32:51
61.191.101.230 attackbotsspam
Unauthorized connection attempt detected from IP address 61.191.101.230 to port 23 [J]
2020-01-29 09:50:07
107.185.225.90 attack
Unauthorized connection attempt detected from IP address 107.185.225.90 to port 80 [J]
2020-01-29 09:22:01
188.255.128.187 attackspam
Unauthorized connection attempt detected from IP address 188.255.128.187 to port 80 [J]
2020-01-29 09:34:39
192.157.231.152 attackspambots
Unauthorized connection attempt detected from IP address 192.157.231.152 to port 1433 [J]
2020-01-29 09:56:40
123.191.130.187 attack
Unauthorized connection attempt detected from IP address 123.191.130.187 to port 8888 [J]
2020-01-29 09:42:30
123.207.167.185 attack
SSH Login Bruteforce
2020-01-29 10:02:40
139.59.7.76 attack
Unauthorized connection attempt detected from IP address 139.59.7.76 to port 2220 [J]
2020-01-29 09:40:20
5.188.114.119 attack
(sshd) Failed SSH login from 5.188.114.119 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 29 00:32:44 s1 sshd[23709]: Invalid user sangani from 5.188.114.119 port 55540
Jan 29 00:32:46 s1 sshd[23709]: Failed password for invalid user sangani from 5.188.114.119 port 55540 ssh2
Jan 29 00:45:41 s1 sshd[26846]: Invalid user nivedita from 5.188.114.119 port 43598
Jan 29 00:45:43 s1 sshd[26846]: Failed password for invalid user nivedita from 5.188.114.119 port 43598 ssh2
Jan 29 00:47:50 s1 sshd[26869]: Invalid user ithaya from 5.188.114.119 port 36036
2020-01-29 09:30:29
187.123.242.161 attackspam
Unauthorized connection attempt detected from IP address 187.123.242.161 to port 23 [J]
2020-01-29 09:58:04
177.45.100.51 attackspambots
Unauthorized connection attempt detected from IP address 177.45.100.51 to port 81 [J]
2020-01-29 09:40:01
111.162.156.123 attackspam
Unauthorized connection attempt detected from IP address 111.162.156.123 to port 443 [J]
2020-01-29 09:21:08
180.95.238.124 attackspambots
Unauthorized connection attempt detected from IP address 180.95.238.124 to port 8888 [J]
2020-01-29 09:38:23
203.57.46.120 attackbots
SSH Brute Force
2020-01-29 09:56:08

Recently Reported IPs

104.71.143.162 104.71.143.134 104.71.143.163 104.70.121.202
152.100.112.71 104.71.143.174 104.71.143.170 104.76.100.220
104.71.186.22 104.81.158.209 104.80.16.134 104.89.170.157
104.89.170.141 104.96.200.240 104.96.200.154 104.71.185.171
104.96.239.187 105.101.203.5 105.102.132.127 105.103.166.135