Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Akamai International B.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.97.190.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10829
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.97.190.119.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082200 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 23 01:01:16 CST 2019
;; MSG SIZE  rcvd: 118
Host info
119.190.97.104.in-addr.arpa domain name pointer a104-97-190-119.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
119.190.97.104.in-addr.arpa	name = a104-97-190-119.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
205.185.114.247 attack
bruteforce detected
2020-05-26 02:34:04
132.148.166.254 attack
Cross-sitescripting
2020-05-26 02:27:44
171.103.172.78 attack
Unauthorised access (May 25) SRC=171.103.172.78 LEN=52 PREC=0x20 TTL=112 ID=28079 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-26 02:24:46
192.241.167.50 attackbots
SSH brute-force: detected 6 distinct usernames within a 24-hour window.
2020-05-26 03:01:24
167.114.98.96 attackspam
SSH brute-force: detected 8 distinct usernames within a 24-hour window.
2020-05-26 02:37:46
122.51.79.83 attack
May 25 17:27:11  sshd\[30203\]: Invalid user user123 from 122.51.79.83May 25 17:27:14  sshd\[30203\]: Failed password for invalid user user123 from 122.51.79.83 port 42724 ssh2
...
2020-05-26 02:44:38
49.234.118.122 attackbots
Invalid user zero from 49.234.118.122 port 53342
2020-05-26 02:53:12
54.37.136.213 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-26 02:52:08
61.178.223.164 attack
May 25 20:49:48 jane sshd[4624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.178.223.164 
May 25 20:49:50 jane sshd[4624]: Failed password for invalid user ubuntu from 61.178.223.164 port 51692 ssh2
...
2020-05-26 02:51:39
118.24.158.42 attack
Invalid user alek from 118.24.158.42 port 54052
2020-05-26 02:45:13
36.110.111.51 attack
Invalid user horde from 36.110.111.51 port 47600
2020-05-26 02:55:22
167.71.210.171 attack
2020-05-25T14:26:12.871104mail.thespaminator.com sshd[21222]: Invalid user orlando from 167.71.210.171 port 40632
2020-05-25T14:26:15.123171mail.thespaminator.com sshd[21222]: Failed password for invalid user orlando from 167.71.210.171 port 40632 ssh2
...
2020-05-26 02:38:08
180.76.174.39 attackbotsspam
 TCP (SYN) 180.76.174.39:56073 -> port 9076, len 44
2020-05-26 02:24:15
218.61.47.132 attackspam
Invalid user tailor from 218.61.47.132 port 50665
2020-05-26 02:57:26
212.145.192.205 attackspam
May 25 19:51:40 minden010 sshd[24868]: Failed password for root from 212.145.192.205 port 59492 ssh2
May 25 19:58:37 minden010 sshd[27694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
May 25 19:58:39 minden010 sshd[27694]: Failed password for invalid user grogers from 212.145.192.205 port 41548 ssh2
...
2020-05-26 02:58:12

Recently Reported IPs

102.66.124.25 120.208.43.174 143.180.238.163 210.3.213.208
92.32.39.94 76.251.32.108 80.195.108.86 222.108.237.222
162.183.117.48 185.39.209.157 174.164.139.51 167.56.132.193
74.81.193.14 137.202.152.31 221.1.97.206 77.147.23.170
106.75.210.147 145.69.189.99 153.141.247.192 44.56.126.103