Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.72.186.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.72.186.121.			IN	A

;; AUTHORITY SECTION:
.			221	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023083102 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 01 09:27:20 CST 2023
;; MSG SIZE  rcvd: 107
Host info
121.186.72.104.in-addr.arpa domain name pointer a104-72-186-121.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.186.72.104.in-addr.arpa	name = a104-72-186-121.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.186.40.140 attack
Oct 12 14:10:48 cdc sshd[8479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.186.40.140  user=root
Oct 12 14:10:50 cdc sshd[8479]: Failed password for invalid user root from 52.186.40.140 port 1280 ssh2
2020-10-13 01:12:43
178.234.37.197 attackspambots
Oct 12 12:57:01 george sshd[5421]: Failed password for invalid user claudio from 178.234.37.197 port 46510 ssh2
Oct 12 13:00:39 george sshd[5526]: Invalid user bear from 178.234.37.197 port 49314
Oct 12 13:00:39 george sshd[5526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.234.37.197 
Oct 12 13:00:41 george sshd[5526]: Failed password for invalid user bear from 178.234.37.197 port 49314 ssh2
Oct 12 13:04:11 george sshd[5585]: Invalid user wolf from 178.234.37.197 port 52120
...
2020-10-13 01:40:11
61.240.148.53 attackspambots
Invalid user tony from 61.240.148.53 port 45414
2020-10-13 01:29:16
198.245.50.142 attack
WordPress xmlrpc
2020-10-13 01:35:08
118.244.206.195 attackspambots
Oct 12 00:59:10 db sshd[29668]: User root from 118.244.206.195 not allowed because none of user's groups are listed in AllowGroups
...
2020-10-13 01:35:49
121.180.203.139 attackspambots
SSH Brute-Force Attack
2020-10-13 01:09:54
101.89.145.133 attackspambots
Oct 11 22:46:13 host sshd[4341]: Invalid user database from 101.89.145.133 port 36090
...
2020-10-13 01:25:02
106.13.177.53 attackbots
2020-10-12T09:25:18.827836linuxbox-skyline sshd[46657]: Invalid user sheba from 106.13.177.53 port 60226
...
2020-10-13 01:32:27
222.186.42.155 attack
Oct 12 18:56:36 markkoudstaal sshd[30912]: Failed password for root from 222.186.42.155 port 27093 ssh2
Oct 12 18:56:38 markkoudstaal sshd[30912]: Failed password for root from 222.186.42.155 port 27093 ssh2
Oct 12 18:56:40 markkoudstaal sshd[30912]: Failed password for root from 222.186.42.155 port 27093 ssh2
...
2020-10-13 00:57:41
129.28.27.25 attack
Invalid user peng from 129.28.27.25 port 33476
2020-10-13 01:12:14
217.60.214.130 attackspambots
2323/tcp
[2020-10-11]1pkt
2020-10-13 01:14:55
158.69.197.113 attackbotsspam
Oct 12 18:33:42 buvik sshd[16373]: Failed password for invalid user pbreau from 158.69.197.113 port 40024 ssh2
Oct 12 18:37:06 buvik sshd[16899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.197.113  user=root
Oct 12 18:37:08 buvik sshd[16899]: Failed password for root from 158.69.197.113 port 43304 ssh2
...
2020-10-13 01:04:23
122.152.198.104 attackbots
Invalid user opensips from 122.152.198.104 port 38514
2020-10-13 01:30:12
114.67.123.3 attackspambots
Automatic Fail2ban report - Trying login SSH
2020-10-13 01:04:42
197.5.145.30 attackbotsspam
Invalid user ftpuser from 197.5.145.30 port 11085
2020-10-13 01:25:56

Recently Reported IPs

149.30.202.1 149.30.205.1 230.31.125.96 187.30.168.154
10.193.32.91 128.199.99.112 230.162.105.197 159.126.235.52
210.1.128.20 54.92.164.155 96.72.84.0 94.19.20.186
50.152.120.37 91.124.113.25 167.114.86.249 70.70.230.206
134.190.237.58 194.28.115.243 109.184.22.206 148.100.79.154