Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Akamai Technologies Inc.

Hostname: unknown

Organization: unknown

Usage Type: Content Delivery Network

Comments:
Type Details Datetime
attack
Attempted connection to port 63691.
2020-04-02 22:53:45
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.75.68.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.75.68.31.			IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040200 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 22:53:37 CST 2020
;; MSG SIZE  rcvd: 116
Host info
31.68.75.104.in-addr.arpa domain name pointer a104-75-68-31.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
31.68.75.104.in-addr.arpa	name = a104-75-68-31.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.188.35.6 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-08-05 23:06:16
149.56.228.253 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 23:09:43
104.206.128.58 attack
TCP 3389 (RDP)
2019-08-05 22:46:49
185.155.96.201 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 23:20:26
218.61.144.245 attackbots
Port scan: Attack repeated for 24 hours
2019-08-05 23:16:54
123.152.20.30 attack
[portscan] tcp/23 [TELNET]
*(RWIN=17605)(08050931)
2019-08-05 22:45:41
185.148.38.97 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-08/08-05]12pkt,1pt.(tcp)
2019-08-05 23:28:12
60.174.79.159 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=3236)(08050931)
2019-08-05 23:14:24
122.228.19.80 attack
[httpReq only by ip - not DomainName]
[multiweb: req 3 domains(hosts/ip)]
[bad UserAgent]
DroneBL:"listed [IRC Drone]"
2019-08-05 23:23:23
187.131.83.208 attackspambots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 22:56:19
62.210.78.84 attack
SIP Server BruteForce Attack
2019-08-05 23:02:56
212.103.61.56 attack
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 2 time(s)]
*(RWIN=1024)(08050931)
2019-08-05 23:05:06
14.231.94.171 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 22:38:06
81.22.45.25 attack
08/05/2019-10:25:56.084339 81.22.45.25 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 79
2019-08-05 22:34:55
216.138.25.243 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 22:39:19

Recently Reported IPs

196.34.147.155 4.15.36.213 154.167.193.59 104.248.163.59
40.103.151.17 104.239.229.47 195.250.239.233 170.129.61.40
80.69.157.194 55.217.207.238 82.149.188.187 109.58.200.178
182.232.191.142 40.107.165.178 146.124.223.221 107.191.42.45
121.161.184.155 11.56.25.68 175.124.152.255 223.96.195.216