Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.95.117.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.95.117.140.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:36:43 CST 2023
;; MSG SIZE  rcvd: 107
Host info
140.117.95.104.in-addr.arpa domain name pointer a104-95-117-140.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.117.95.104.in-addr.arpa	name = a104-95-117-140.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
152.32.146.169 attack
Automatic report - Banned IP Access
2020-01-08 18:31:43
124.156.169.7 attack
leo_www
2020-01-08 18:52:38
189.108.95.99 attackbotsspam
Unauthorized connection attempt detected from IP address 189.108.95.99 to port 445
2020-01-08 18:44:11
124.6.158.62 attackbotsspam
01/08/2020-05:47:18.904810 124.6.158.62 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-08 18:59:25
195.225.229.214 attackspambots
Unauthorized connection attempt detected from IP address 195.225.229.214 to port 2220 [J]
2020-01-08 18:34:46
172.247.123.99 attackbots
Unauthorized connection attempt detected from IP address 172.247.123.99 to port 2220 [J]
2020-01-08 18:47:01
2.180.72.250 attackbotsspam
01/07/2020-23:47:56.979370 2.180.72.250 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-08 18:39:36
49.88.112.75 attack
Jan  8 15:33:50 gw1 sshd[11441]: Failed password for root from 49.88.112.75 port 62456 ssh2
Jan  8 15:33:53 gw1 sshd[11441]: Failed password for root from 49.88.112.75 port 62456 ssh2
...
2020-01-08 18:38:33
52.230.66.101 attackbots
Unauthorized connection attempt detected from IP address 52.230.66.101 to port 2220 [J]
2020-01-08 18:52:02
207.154.218.16 attackspambots
Unauthorized connection attempt detected from IP address 207.154.218.16 to port 2220 [J]
2020-01-08 18:45:04
103.112.58.242 attack
Unauthorized connection attempt from IP address 103.112.58.242 on Port 445(SMB)
2020-01-08 18:29:30
213.230.96.243 attack
WordPress login Brute force / Web App Attack on client site.
2020-01-08 18:20:55
177.139.194.169 attack
Unauthorized connection attempt from IP address 177.139.194.169 on Port 445(SMB)
2020-01-08 18:24:12
117.48.201.107 attackspambots
117.48.201.107 - - [08/Jan/2020:08:41:01 +0100] "POST /wp-login.php HTTP/1.1" 200 3121 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
117.48.201.107 - - [08/Jan/2020:08:41:07 +0100] "POST /wp-login.php HTTP/1.1" 200 3100 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-08 18:46:27
5.228.202.69 attackbots
SSH/22 MH Probe, BF, Hack -
2020-01-08 18:22:15

Recently Reported IPs

104.94.37.203 104.95.140.159 104.94.77.235 104.94.95.42
104.94.41.131 104.95.109.48 104.95.157.162 104.95.15.91
104.95.16.243 104.95.116.1 104.94.9.229 104.95.106.34
104.95.125.133 104.95.179.232 104.95.142.238 104.95.145.79
104.95.129.229 104.95.158.176 104.95.136.90 104.95.148.236