Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.80.244.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30809
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.80.244.46.			IN	A

;; AUTHORITY SECTION:
.			270	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:31:20 CST 2023
;; MSG SIZE  rcvd: 106
Host info
46.244.80.104.in-addr.arpa domain name pointer a104-80-244-46.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.244.80.104.in-addr.arpa	name = a104-80-244-46.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.24.232.241 attackspam
Invalid user amin2 from 118.24.232.241 port 51808
2020-04-20 21:35:31
45.55.88.16 attackbots
leo_www
2020-04-20 22:05:51
49.235.172.132 attack
Invalid user uuidd from 49.235.172.132 port 52748
2020-04-20 22:02:57
15.236.117.214 attack
Invalid user vcsa from 15.236.117.214 port 59694
2020-04-20 22:09:46
86.105.53.132 attackspam
Apr 20 10:12:50 dns1 sshd[15631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.53.132 
Apr 20 10:12:53 dns1 sshd[15631]: Failed password for invalid user tt from 86.105.53.132 port 52110 ssh2
Apr 20 10:18:46 dns1 sshd[16222]: Failed password for root from 86.105.53.132 port 44950 ssh2
2020-04-20 21:51:32
27.34.251.60 attackspambots
Apr 20 14:32:30 ns382633 sshd\[3408\]: Invalid user xi from 27.34.251.60 port 55528
Apr 20 14:32:30 ns382633 sshd\[3408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.34.251.60
Apr 20 14:32:32 ns382633 sshd\[3408\]: Failed password for invalid user xi from 27.34.251.60 port 55528 ssh2
Apr 20 14:40:06 ns382633 sshd\[4899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.34.251.60  user=root
Apr 20 14:40:09 ns382633 sshd\[4899\]: Failed password for root from 27.34.251.60 port 54864 ssh2
2020-04-20 22:09:00
218.6.62.85 attackspam
Invalid user test2 from 218.6.62.85 port 48821
2020-04-20 22:16:37
103.74.122.210 attackbotsspam
Apr 20 12:41:21 XXXXXX sshd[1271]: Invalid user il from 103.74.122.210 port 33014
2020-04-20 21:48:59
61.19.23.170 attackspambots
Brute force SMTP login attempted.
...
2020-04-20 21:58:56
116.85.40.181 attack
$f2bV_matches
2020-04-20 21:37:07
111.229.116.240 attackspambots
Invalid user bp from 111.229.116.240 port 37938
2020-04-20 21:40:51
51.91.125.136 attackspam
Invalid user kh from 51.91.125.136 port 35496
2020-04-20 22:00:52
82.148.18.176 attack
Invalid user oa from 82.148.18.176 port 39094
2020-04-20 21:53:05
14.187.127.172 attack
Invalid user admin from 14.187.127.172 port 46320
2020-04-20 22:10:20
111.230.10.176 attackspambots
Invalid user kq from 111.230.10.176 port 46104
2020-04-20 21:40:12

Recently Reported IPs

104.8.57.9 104.8.86.53 104.80.238.2 104.80.29.33
104.80.36.184 104.80.247.70 104.80.63.215 104.80.7.84
104.80.57.44 104.80.174.248 104.80.79.5 104.80.77.177
104.80.78.130 104.80.187.2 104.80.83.88 104.8.30.188
104.80.165.172 104.80.231.199 104.80.9.239 104.8.47.74