Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.82.42.87
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.82.42.87.			IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:32:14 CST 2023
;; MSG SIZE  rcvd: 105
Host info
87.42.82.104.in-addr.arpa domain name pointer a104-82-42-87.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
87.42.82.104.in-addr.arpa	name = a104-82-42-87.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.216.211.53 attackspambots
Brute force attempt
2019-07-04 00:51:15
27.115.124.70 attackbotsspam
[WedJul0318:34:26.8025912019][:error][pid23363:tid47528769005312][client27.115.124.70:53013][client27.115.124.70]ModSecurity:Accessdeniedwithcode403\(phase1\).Matchof"rx\^0\$"against"REQUEST_HEADERS:Content-Length"required.[file"/etc/apache2/conf.d/modsec_rules/10_asl_rules.conf"][line"96"][id"392301"][rev"7"][msg"Atomicorp.comWAFRules:RequestContainingContent\,butMissingContent-Typeheader"][severity"NOTICE"][tag"no_ar"][hostname"136.243.224.57"][uri"/sdk"][unique_id"XRzZEmAFmHlDSvUy9@pUwQAAAMo"][WedJul0318:34:27.7513202019][:error][pid23360:tid47528754296576][client27.115.124.70:62353][client27.115.124.70]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:n\(\?:-stealth\|sauditor\|e\(\?:ssus\|etwork-services-auditor\)\|ikto\|map\)\|b\(\?:lack\?widow\|rutus\|ilbo\)\|web\(\?:inspec\|roo\)t\|p\(\?:mafind\|aros\|avuk\)\|cgichk\|jaascois\|\\\\\\\\.nasl\|metis\|w\(\?:ebtrendssecurityanalyzer\|hcc\|3af\\\\\\\\.sourceforge\\\\\\\\.net\)\|\\\\\\\\bzmeu\\\\\\\\b\|springenwerk\|...
2019-07-04 00:50:36
216.218.206.87 attackspambots
3389BruteforceFW22
2019-07-04 00:19:03
37.235.153.214 attackbots
proto=tcp  .  spt=60936  .  dpt=25  .     (listed on Blocklist de  Jul 02)     (741)
2019-07-04 00:31:26
91.134.231.96 attack
C1,DEF GET /wp-login.php
2019-07-04 01:09:17
61.161.237.38 attackbotsspam
Jul  3 16:22:04 server sshd[53364]: Failed password for invalid user console from 61.161.237.38 port 60650 ssh2
Jul  3 16:35:41 server sshd[56317]: Failed password for invalid user appuser from 61.161.237.38 port 36332 ssh2
Jul  3 16:38:08 server sshd[56840]: Failed password for invalid user install from 61.161.237.38 port 51680 ssh2
2019-07-04 00:35:27
85.185.152.146 attackbotsspam
proto=tcp  .  spt=33110  .  dpt=25  .     (listed on Blocklist de  Jul 02)     (743)
2019-07-04 00:26:23
90.188.16.246 attackbotsspam
proto=tcp  .  spt=46274  .  dpt=25  .     (listed on Blocklist de  Jul 02)     (736)
2019-07-04 00:39:37
185.222.211.14 attackbotsspam
03.07.2019 15:59:48 SMTP access blocked by firewall
2019-07-04 00:37:32
36.62.4.12 attackbots
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x
2019-07-03 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=36.62.4.12
2019-07-04 00:54:11
222.254.24.160 attackbotsspam
Jul  3 15:11:36 h2022099 sshd[11826]: Address 222.254.24.160 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul  3 15:11:36 h2022099 sshd[11826]: Invalid user admin from 222.254.24.160
Jul  3 15:11:36 h2022099 sshd[11826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.254.24.160 
Jul  3 15:11:38 h2022099 sshd[11826]: Failed password for invalid user admin from 222.254.24.160 port 51804 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=222.254.24.160
2019-07-04 01:12:56
93.151.249.21 attackspambots
2019-07-03 14:04:02 H=net-93-151-249-21.cust.dsl.teletu.hostname [93.151.249.21]:10857 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=93.151.249.21)
2019-07-03 14:04:03 unexpected disconnection while reading SMTP command from net-93-151-249-21.cust.dsl.teletu.hostname [93.151.249.21]:10857 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-03 15:10:45 H=net-93-151-249-21.cust.dsl.teletu.hostname [93.151.249.21]:16132 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=93.151.249.21)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=93.151.249.21
2019-07-04 01:06:17
89.238.139.208 attack
Postfix RBL failed
2019-07-04 01:05:45
201.77.137.20 attack
Jul  3 12:37:50 w sshd[11329]: reveeclipse mapping checking getaddrinfo for 20.137.77.201.axtelecom.com.br [201.77.137.20] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  3 12:37:50 w sshd[11329]: Invalid user gan from 201.77.137.20
Jul  3 12:37:50 w sshd[11329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.77.137.20 
Jul  3 12:37:52 w sshd[11329]: Failed password for invalid user gan from 201.77.137.20 port 37424 ssh2
Jul  3 12:37:52 w sshd[11329]: Received disconnect from 201.77.137.20: 11: Bye Bye [preauth]
Jul  3 12:52:33 w sshd[11494]: reveeclipse mapping checking getaddrinfo for 20.137.77.201.axtelecom.com.br [201.77.137.20] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  3 12:52:33 w sshd[11494]: Invalid user oliver from 201.77.137.20
Jul  3 12:52:33 w sshd[11494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.77.137.20 
Jul  3 12:52:35 w sshd[11494]: Failed password for invalid user o........
-------------------------------
2019-07-04 00:34:00
51.38.83.164 attack
Jul  3 13:39:29 localhost sshd\[31182\]: Invalid user stanchion from 51.38.83.164 port 46028
Jul  3 13:39:29 localhost sshd\[31182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.83.164
Jul  3 13:39:31 localhost sshd\[31182\]: Failed password for invalid user stanchion from 51.38.83.164 port 46028 ssh2
Jul  3 13:41:33 localhost sshd\[31253\]: Invalid user jiu from 51.38.83.164 port 43348
Jul  3 13:41:33 localhost sshd\[31253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.83.164
...
2019-07-04 01:04:15

Recently Reported IPs

104.82.216.18 104.82.60.213 104.82.69.228 104.83.136.125
104.82.89.131 104.82.80.197 104.82.159.124 104.83.104.126
104.82.25.225 104.83.138.180 104.82.40.36 104.83.151.18
104.83.10.54 104.83.108.108 104.82.233.162 104.82.46.13
104.83.163.137 104.83.164.33 104.82.95.49 104.83.161.105