Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.93.139.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.93.139.231.			IN	A

;; AUTHORITY SECTION:
.			235	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:36:08 CST 2023
;; MSG SIZE  rcvd: 107
Host info
231.139.93.104.in-addr.arpa domain name pointer a104-93-139-231.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
231.139.93.104.in-addr.arpa	name = a104-93-139-231.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
63.80.189.176 attack
Autoban   63.80.189.176 AUTH/CONNECT
2019-12-13 01:30:10
63.81.87.99 attackspambots
Autoban   63.81.87.99 AUTH/CONNECT
2019-12-13 00:52:17
63.80.189.177 attack
Autoban   63.80.189.177 AUTH/CONNECT
2019-12-13 01:29:43
63.81.87.75 attackspam
Autoban   63.81.87.75 AUTH/CONNECT
2019-12-13 01:02:59
34.93.149.4 attackspam
2019-12-12T18:10:53.142494stark.klein-stark.info sshd\[7376\]: Invalid user macinnes from 34.93.149.4 port 52532
2019-12-12T18:10:53.150385stark.klein-stark.info sshd\[7376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.149.93.34.bc.googleusercontent.com
2019-12-12T18:10:55.203685stark.klein-stark.info sshd\[7376\]: Failed password for invalid user macinnes from 34.93.149.4 port 52532 ssh2
...
2019-12-13 01:15:29
165.227.104.253 attackbots
2019-12-12T10:02:38.848280-07:00 suse-nuc sshd[13898]: Invalid user mie from 165.227.104.253 port 43441
...
2019-12-13 01:05:35
129.28.128.149 attackspam
Dec 12 17:29:54 legacy sshd[13394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.128.149
Dec 12 17:29:55 legacy sshd[13394]: Failed password for invalid user cy from 129.28.128.149 port 50892 ssh2
Dec 12 17:38:21 legacy sshd[13685]: Failed password for root from 129.28.128.149 port 54762 ssh2
...
2019-12-13 00:59:40
36.229.133.135 attackbots
54068/tcp 54068/tcp 54068/tcp...
[2019-12-12]5pkt,1pt.(tcp)
2019-12-13 01:20:02
103.37.233.150 attack
445/tcp
[2019-12-12]1pkt
2019-12-13 00:58:08
63.81.87.95 attackspam
Autoban   63.81.87.95 AUTH/CONNECT
2019-12-13 00:53:49
63.80.189.173 attack
Autoban   63.80.189.173 AUTH/CONNECT
2019-12-13 01:34:11
119.93.79.182 attackbots
1576166904 - 12/12/2019 17:08:24 Host: 119.93.79.182/119.93.79.182 Port: 8080 TCP Blocked
2019-12-13 01:13:07
63.80.189.39 attackspam
Autoban   63.80.189.39 AUTH/CONNECT
2019-12-13 01:22:43
115.75.255.186 attackbots
8080/tcp
[2019-12-12]1pkt
2019-12-13 00:55:49
104.254.92.22 attackbotsspam
(From toni.milerum@gmail.com) Do you want to promote your business on tons of online ad sites monthly? One tiny investment every month will get you virtually endless traffic to your site forever!To find out more check out our site here: http://www.submitmyadnow.tech
2019-12-13 01:00:20

Recently Reported IPs

104.93.124.141 104.93.159.227 104.92.54.58 104.93.191.186
104.93.203.166 104.93.142.238 104.92.80.57 104.93.181.194
104.93.2.38 104.93.211.74 104.93.196.110 104.93.171.245
104.93.189.153 104.92.35.27 104.93.2.51 104.93.232.20
104.93.234.34 104.93.188.25 104.93.254.22 104.93.23.29