Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.83.157.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.83.157.130.			IN	A

;; AUTHORITY SECTION:
.			461	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:32:22 CST 2023
;; MSG SIZE  rcvd: 107
Host info
130.157.83.104.in-addr.arpa domain name pointer a104-83-157-130.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.157.83.104.in-addr.arpa	name = a104-83-157-130.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.232.162.77 attackspambots
2020-08-19T06:58:58.997084hostname sshd[123587]: Failed password for invalid user pst from 49.232.162.77 port 50612 ssh2
...
2020-08-21 03:16:10
85.172.54.244 attackspambots
Unauthorized connection attempt from IP address 85.172.54.244 on Port 445(SMB)
2020-08-21 03:31:22
124.107.36.6 attack
Unauthorized connection attempt from IP address 124.107.36.6 on Port 445(SMB)
2020-08-21 03:30:40
46.98.131.61 attackspam
1597934057 - 08/20/2020 16:34:17 Host: 46.98.131.61/46.98.131.61 Port: 445 TCP Blocked
2020-08-21 02:54:27
37.26.0.218 attackbotsspam
Unauthorized connection attempt from IP address 37.26.0.218 on Port 445(SMB)
2020-08-21 02:59:25
161.35.19.176 attack
161.35.19.176 - - [20/Aug/2020:17:58:52 +0200] "GET /wp-login.php HTTP/1.1" 200 8691 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.19.176 - - [20/Aug/2020:17:58:54 +0200] "POST /wp-login.php HTTP/1.1" 200 8921 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.19.176 - - [20/Aug/2020:17:58:55 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-21 03:08:08
93.174.93.195 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 24576 proto: udp cat: Misc Attackbytes: 71
2020-08-21 03:20:43
222.124.125.219 attackbots
Automatic report - Port Scan Attack
2020-08-21 03:11:45
200.88.48.99 attackbotsspam
Aug 20 12:05:09 dignus sshd[19565]: Failed password for invalid user user2 from 200.88.48.99 port 60142 ssh2
Aug 20 12:09:37 dignus sshd[20091]: Invalid user ye from 200.88.48.99 port 37948
Aug 20 12:09:37 dignus sshd[20091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.88.48.99
Aug 20 12:09:39 dignus sshd[20091]: Failed password for invalid user ye from 200.88.48.99 port 37948 ssh2
Aug 20 12:13:55 dignus sshd[20626]: Invalid user brd from 200.88.48.99 port 43982
...
2020-08-21 03:17:43
49.233.216.158 attackbotsspam
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-21 03:18:05
182.75.248.254 attackspam
Aug 20 16:02:33 firewall sshd[28507]: Invalid user admin from 182.75.248.254
Aug 20 16:02:35 firewall sshd[28507]: Failed password for invalid user admin from 182.75.248.254 port 2575 ssh2
Aug 20 16:09:53 firewall sshd[28814]: Invalid user deploy from 182.75.248.254
...
2020-08-21 03:23:29
190.77.148.53 attackspam
Port Scan
...
2020-08-21 03:09:57
64.227.20.179 attackbotsspam
abuseConfidenceScore blocked for 12h
2020-08-21 03:15:41
141.98.9.157 attackspam
Aug 20 21:19:16 haigwepa sshd[7599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157 
Aug 20 21:19:18 haigwepa sshd[7599]: Failed password for invalid user admin from 141.98.9.157 port 41563 ssh2
...
2020-08-21 03:20:17
49.232.161.243 attack
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-21 03:20:58

Recently Reported IPs

104.83.161.105 104.83.115.15 104.83.196.63 104.83.165.84
104.83.206.190 104.83.118.80 104.83.166.56 104.83.199.192
104.83.214.145 104.83.221.226 104.83.222.146 104.83.190.81
104.83.181.211 104.83.195.248 104.83.211.19 104.82.39.71
104.83.182.122 104.83.143.180 104.83.171.58 104.83.213.61