Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Secaucus

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.81.134.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.81.134.83.			IN	A

;; AUTHORITY SECTION:
.			193	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 09:50:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
83.134.81.104.in-addr.arpa domain name pointer a104-81-134-83.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.134.81.104.in-addr.arpa	name = a104-81-134-83.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.35.118.42 attackspam
May 11 03:50:36 124388 sshd[6302]: Invalid user insurgency from 117.35.118.42 port 39346
May 11 03:50:36 124388 sshd[6302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.35.118.42
May 11 03:50:36 124388 sshd[6302]: Invalid user insurgency from 117.35.118.42 port 39346
May 11 03:50:38 124388 sshd[6302]: Failed password for invalid user insurgency from 117.35.118.42 port 39346 ssh2
May 11 03:54:02 124388 sshd[6357]: Invalid user admin from 117.35.118.42 port 60146
2020-05-11 14:33:31
193.56.28.166 attackbotsspam
May 11 2020, 06:13:09 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-05-11 14:18:55
14.239.62.151 attackbotsspam
Lines containing failures of 14.239.62.151
May 11 05:52:58 mellenthin sshd[5477]: Did not receive identification string from 14.239.62.151 port 63181
May 11 05:53:24 mellenthin sshd[5478]: Invalid user admina from 14.239.62.151 port 63555
May 11 05:53:35 mellenthin sshd[5478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.239.62.151
May 11 05:53:37 mellenthin sshd[5478]: Failed password for invalid user admina from 14.239.62.151 port 63555 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.239.62.151
2020-05-11 14:54:01
36.68.237.121 attackbots
20/5/10@23:53:52: FAIL: Alarm-Network address from=36.68.237.121
20/5/10@23:53:52: FAIL: Alarm-Network address from=36.68.237.121
...
2020-05-11 14:27:21
222.186.15.10 attackspam
May 11 02:48:31 plusreed sshd[27833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
May 11 02:48:33 plusreed sshd[27833]: Failed password for root from 222.186.15.10 port 63113 ssh2
...
2020-05-11 14:52:40
185.176.27.54 attack
05/11/2020-01:42:31.715732 185.176.27.54 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-11 14:47:38
106.75.227.29 attack
(smtpauth) Failed SMTP AUTH login from 106.75.227.29 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-11 08:23:33 login authenticator failed for (ADMIN) [106.75.227.29]: 535 Incorrect authentication data (set_id=info@fmc-co.com)
2020-05-11 14:53:05
125.74.95.195 attackspam
May 11 07:24:24 ns382633 sshd\[26103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.95.195  user=root
May 11 07:24:26 ns382633 sshd\[26103\]: Failed password for root from 125.74.95.195 port 45332 ssh2
May 11 07:43:05 ns382633 sshd\[29733\]: Invalid user ftpuser from 125.74.95.195 port 51328
May 11 07:43:05 ns382633 sshd\[29733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.95.195
May 11 07:43:08 ns382633 sshd\[29733\]: Failed password for invalid user ftpuser from 125.74.95.195 port 51328 ssh2
2020-05-11 14:15:44
49.88.112.55 attack
Brute force attempt
2020-05-11 14:08:23
125.164.32.137 attack
SSH brute-force attempt
2020-05-11 14:29:39
178.62.21.80 attackspambots
May 11 05:42:07 ns382633 sshd\[6763\]: Invalid user list1 from 178.62.21.80 port 52488
May 11 05:42:07 ns382633 sshd\[6763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.21.80
May 11 05:42:09 ns382633 sshd\[6763\]: Failed password for invalid user list1 from 178.62.21.80 port 52488 ssh2
May 11 05:53:39 ns382633 sshd\[8728\]: Invalid user cinzia from 178.62.21.80 port 38668
May 11 05:53:39 ns382633 sshd\[8728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.21.80
2020-05-11 14:51:09
177.128.104.207 attackbotsspam
May 11 16:09:54 localhost sshd[1014106]: Invalid user alan from 177.128.104.207 port 33928
...
2020-05-11 14:15:20
107.170.135.29 attackspambots
2020-05-11T07:55:25.463336  sshd[675]: Invalid user alpha from 107.170.135.29 port 46181
2020-05-11T07:55:25.478841  sshd[675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.135.29
2020-05-11T07:55:25.463336  sshd[675]: Invalid user alpha from 107.170.135.29 port 46181
2020-05-11T07:55:27.863973  sshd[675]: Failed password for invalid user alpha from 107.170.135.29 port 46181 ssh2
...
2020-05-11 14:46:23
106.13.165.164 attack
May 11 06:30:23 inter-technics sshd[9027]: Invalid user tela from 106.13.165.164 port 49852
May 11 06:30:23 inter-technics sshd[9027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.165.164
May 11 06:30:23 inter-technics sshd[9027]: Invalid user tela from 106.13.165.164 port 49852
May 11 06:30:25 inter-technics sshd[9027]: Failed password for invalid user tela from 106.13.165.164 port 49852 ssh2
May 11 06:37:44 inter-technics sshd[16820]: Invalid user sentry from 106.13.165.164 port 46186
...
2020-05-11 14:12:33
116.90.81.15 attack
May 10 19:43:05 kapalua sshd\[27154\]: Invalid user postgres from 116.90.81.15
May 10 19:43:05 kapalua sshd\[27154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.90.81.15
May 10 19:43:08 kapalua sshd\[27154\]: Failed password for invalid user postgres from 116.90.81.15 port 11139 ssh2
May 10 19:46:09 kapalua sshd\[27454\]: Invalid user user from 116.90.81.15
May 10 19:46:09 kapalua sshd\[27454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.90.81.15
2020-05-11 14:49:34

Recently Reported IPs

104.76.102.217 104.81.136.50 104.86.96.96 104.97.85.178
105.158.141.28 105.209.40.140 105.247.24.25 105.247.31.163
105.29.158.151 106.102.129.28 106.12.144.97 106.12.167.77
106.12.197.132 106.12.21.108 106.12.35.162 106.12.55.199
106.120.198.80 106.120.82.80 106.120.82.87 106.125.150.201