Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.20.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.20.28.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032502 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 26 07:13:21 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 28.20.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.20.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.178.175.161 attack
Automatic report - Port Scan Attack
2020-09-01 23:15:06
113.172.207.210 attackspam
Unauthorized connection attempt from IP address 113.172.207.210 on Port 445(SMB)
2020-09-01 23:22:39
114.204.218.154 attackspam
$f2bV_matches
2020-09-01 23:55:50
125.173.166.82 attackbotsspam
Automatic report - Port Scan Attack
2020-09-01 23:20:13
161.35.107.107 attackbotsspam
LAMP,DEF GET /wp-login.php
2020-09-01 23:13:32
217.219.215.34 attack
20/9/1@08:33:03: FAIL: Alarm-Network address from=217.219.215.34
20/9/1@08:33:04: FAIL: Alarm-Network address from=217.219.215.34
...
2020-09-01 22:39:27
35.241.75.144 attack
Sep  1 14:28:25 cho sshd[2043722]: Invalid user liza from 35.241.75.144 port 33646
Sep  1 14:28:25 cho sshd[2043722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.241.75.144 
Sep  1 14:28:25 cho sshd[2043722]: Invalid user liza from 35.241.75.144 port 33646
Sep  1 14:28:27 cho sshd[2043722]: Failed password for invalid user liza from 35.241.75.144 port 33646 ssh2
Sep  1 14:32:09 cho sshd[2043845]: Invalid user magda from 35.241.75.144 port 35758
...
2020-09-01 23:39:23
218.92.0.211 attackbotsspam
prod8
...
2020-09-01 23:32:00
27.64.118.40 attack
SSH Honeypot -> SSH Bruteforce / Login
2020-09-01 23:07:26
192.163.198.218 attackspambots
firewall-block, port(s): 22077/tcp
2020-09-01 23:53:44
85.174.201.64 attackbotsspam
Unauthorized connection attempt from IP address 85.174.201.64 on Port 445(SMB)
2020-09-01 23:26:46
185.123.164.54 attackspam
Sep  1 16:32:48 pornomens sshd\[23969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.123.164.54  user=root
Sep  1 16:32:50 pornomens sshd\[23969\]: Failed password for root from 185.123.164.54 port 44921 ssh2
Sep  1 16:36:43 pornomens sshd\[24019\]: Invalid user martina from 185.123.164.54 port 47879
Sep  1 16:36:43 pornomens sshd\[24019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.123.164.54
...
2020-09-01 23:27:27
198.245.63.65 attack
WordPress login Brute force / Web App Attack on client site.
2020-09-01 23:47:13
49.88.112.110 attack
Sep  1 22:09:54 webhost01 sshd[9986]: Failed password for root from 49.88.112.110 port 23960 ssh2
Sep  1 22:09:56 webhost01 sshd[9986]: Failed password for root from 49.88.112.110 port 23960 ssh2
...
2020-09-01 23:34:41
159.135.231.71 attackbotsspam
Spam from joinf.com
2020-09-01 23:59:09

Recently Reported IPs

104.19.199.176 104.19.210.209 104.19.212.123 104.19.212.132
71.148.51.40 104.19.213.132 104.19.214.242 104.19.217.16
104.19.218.16 104.19.219.50 104.19.221.15 104.19.223.16
104.19.224.53 104.19.229.126 234.41.67.8 104.19.229.16
233.151.117.245 53.58.56.81 104.19.229.69 104.19.230.119