Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.199.112.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.199.112.20.			IN	A

;; AUTHORITY SECTION:
.			416	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 18:34:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
20.112.199.104.in-addr.arpa domain name pointer 20.112.199.104.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.112.199.104.in-addr.arpa	name = 20.112.199.104.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
39.53.250.9 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-24 04:37:04
116.255.149.226 attack
Nov 23 15:19:56 lnxmail61 sshd[6877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.149.226
2019-11-24 04:32:57
83.16.14.107 attackspam
Nov 22 21:41:09 woltan sshd[27221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.16.14.107
Nov 22 21:41:09 woltan sshd[27221]: Failed password for invalid user altibase from 83.16.14.107 port 37442 ssh2
2019-11-24 04:47:14
119.185.233.2 attackbots
badbot
2019-11-24 04:57:29
103.39.133.110 attackspambots
Nov 23 15:44:49 firewall sshd[24632]: Invalid user asai from 103.39.133.110
Nov 23 15:44:51 firewall sshd[24632]: Failed password for invalid user asai from 103.39.133.110 port 41956 ssh2
Nov 23 15:48:59 firewall sshd[24716]: Invalid user flueckinger from 103.39.133.110
...
2019-11-24 04:26:33
80.211.249.177 attack
Brute-force attempt banned
2019-11-24 05:01:00
51.79.141.17 attack
Nov 23 20:51:13 vmd26974 sshd[24942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.141.17
Nov 23 20:51:15 vmd26974 sshd[24942]: Failed password for invalid user operator from 51.79.141.17 port 54422 ssh2
...
2019-11-24 04:53:25
118.25.195.244 attack
Nov 23 21:52:59 server sshd\[10000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.195.244  user=root
Nov 23 21:53:02 server sshd\[10000\]: Failed password for root from 118.25.195.244 port 53516 ssh2
Nov 23 22:03:43 server sshd\[12933\]: Invalid user squid from 118.25.195.244
Nov 23 22:03:43 server sshd\[12933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.195.244 
Nov 23 22:03:45 server sshd\[12933\]: Failed password for invalid user squid from 118.25.195.244 port 35734 ssh2
...
2019-11-24 04:52:56
2.190.78.73 attackspambots
SMTP/25/465/587 Probe, BadAuth, SPAM, Hack -
2019-11-24 04:29:33
212.36.28.70 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-24 04:48:21
134.209.223.214 attackbotsspam
134.209.223.214 - - \[23/Nov/2019:15:19:06 +0100\] "POST /wp-login.php HTTP/1.0" 200 6655 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
134.209.223.214 - - \[23/Nov/2019:15:19:11 +0100\] "POST /wp-login.php HTTP/1.0" 200 6493 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
134.209.223.214 - - \[23/Nov/2019:15:19:15 +0100\] "POST /wp-login.php HTTP/1.0" 200 6492 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-24 04:59:19
139.59.9.251 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-24 05:02:25
117.135.90.185 attack
Automatic report - Port Scan
2019-11-24 04:36:49
187.109.169.45 attackbotsspam
SMTP-SASL bruteforce attempt
2019-11-24 04:27:56
123.125.71.54 attackspambots
Automatic report - Banned IP Access
2019-11-24 05:03:46

Recently Reported IPs

104.199.110.80 104.199.112.222 104.199.113.182 104.199.113.65
104.199.114.53 2.155.99.192 104.199.114.61 166.20.53.110
104.199.114.90 104.199.115.136 104.199.115.212 158.63.200.48
104.199.115.226 104.199.116.11 104.199.116.41 104.199.117.178
244.56.192.23 104.199.117.56 104.199.117.69 104.199.118.105