Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.170.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.170.54.			IN	A

;; AUTHORITY SECTION:
.			344	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:03:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.170.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.170.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.25.203.130 attackbotsspam
Hits on port : 22
2020-04-09 19:28:40
45.55.179.132 attackspam
Apr  9 13:07:12 host5 sshd[19226]: Invalid user bitbucket from 45.55.179.132 port 48707
...
2020-04-09 19:36:11
83.29.153.179 attack
" "
2020-04-09 19:31:55
115.75.161.229 attack
20/4/9@04:28:31: FAIL: Alarm-Network address from=115.75.161.229
...
2020-04-09 19:56:42
34.93.175.185 attackbots
Apr  9 07:52:00 tuotantolaitos sshd[19056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.175.185
Apr  9 07:52:02 tuotantolaitos sshd[19056]: Failed password for invalid user test5 from 34.93.175.185 port 58980 ssh2
...
2020-04-09 19:40:14
36.155.114.151 attack
Apr  9 07:45:15 jupiter sshd[62329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.114.151
Apr  9 07:45:17 jupiter sshd[62329]: Failed password for invalid user admin from 36.155.114.151 port 52982 ssh2
...
2020-04-09 19:20:39
13.126.194.180 attackbotsspam
SSH brute-force attempt
2020-04-09 19:46:15
118.136.5.197 attackspambots
Web Probe / Attack
2020-04-09 19:45:00
177.43.236.178 attackspambots
2020-04-09T11:47:23.128971v22018076590370373 sshd[1639]: Failed password for root from 177.43.236.178 port 52660 ssh2
2020-04-09T11:49:39.026789v22018076590370373 sshd[16300]: Invalid user saballet from 177.43.236.178 port 58376
2020-04-09T11:49:39.033100v22018076590370373 sshd[16300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.236.178
2020-04-09T11:49:39.026789v22018076590370373 sshd[16300]: Invalid user saballet from 177.43.236.178 port 58376
2020-04-09T11:49:40.902733v22018076590370373 sshd[16300]: Failed password for invalid user saballet from 177.43.236.178 port 58376 ssh2
...
2020-04-09 19:45:58
70.45.133.188 attack
2020-04-08 UTC: (19x) - admin,ansibleuser,deploy,frida,ftpuser,josh,losts,nagios,peter,postgres,root,sinus,storm,teamspeak,ts3bot,ubuntu(2x),user,weblogic
2020-04-09 19:55:58
49.233.153.154 attackbots
$f2bV_matches
2020-04-09 19:15:55
119.28.222.106 attackspambots
20 attempts against mh-misbehave-ban on river
2020-04-09 19:41:43
113.21.118.74 attackspam
Dovecot Invalid User Login Attempt.
2020-04-09 19:15:29
51.83.216.249 attack
trying to access non-authorized port
2020-04-09 19:31:21
185.132.228.118 attackbotsspam
Brute force attempt
2020-04-09 19:40:28

Recently Reported IPs

104.20.17.84 104.20.174.88 104.20.17.25 104.20.174.5
104.20.175.30 104.20.177.9 104.21.66.249 104.20.175.88
104.20.175.5 104.20.176.9 104.20.18.27 104.20.178.42
104.20.18.170 104.20.18.89 104.20.179.42 104.20.180.16
104.20.18.84 104.20.181.16 104.20.188.26 104.20.186.112