Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.190.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.190.149.			IN	A

;; AUTHORITY SECTION:
.			380	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 18:45:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 149.190.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.190.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.188.182.6 attack
fail2ban - Attack against Apache (too many 404s)
2020-09-04 15:28:54
31.40.184.97 attackbots
Honeypot attack, port: 5555, PTR: 31-40-184-97.ivcdon.net.
2020-09-04 16:04:49
193.228.91.123 attackbotsspam
SSH brutforce
2020-09-04 15:55:41
79.143.188.234 attack
Invalid user oracle from 79.143.188.234 port 43444
2020-09-04 15:59:17
73.186.246.242 attackbotsspam
Firewall Dropped Connection
2020-09-04 15:30:52
118.69.71.106 attack
fail2ban
2020-09-04 15:53:52
88.156.122.72 attackspam
<6 unauthorized SSH connections
2020-09-04 16:00:38
103.145.13.158 attackbotsspam
Port scan denied
2020-09-04 15:43:01
157.245.74.244 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-04 15:38:13
200.21.174.58 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-04 15:25:16
152.101.29.177 attack
Portscan detected
2020-09-04 15:55:57
112.64.33.38 attack
SSH brutforce
2020-09-04 16:04:19
45.142.120.183 attackspam
SMTP Brute-Forcing
2020-09-04 15:40:18
188.165.236.122 attack
Sep  4 09:41:07 vps639187 sshd\[23170\]: Invalid user rocessor from 188.165.236.122 port 50897
Sep  4 09:41:07 vps639187 sshd\[23170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.236.122
Sep  4 09:41:09 vps639187 sshd\[23170\]: Failed password for invalid user rocessor from 188.165.236.122 port 50897 ssh2
...
2020-09-04 16:01:53
49.51.9.87 attackspambots
 TCP (SYN) 49.51.9.87:32929 -> port 5222, len 44
2020-09-04 15:30:31

Recently Reported IPs

104.20.19.151 104.20.191.149 104.20.20.151 104.20.21.180
104.20.22.180 104.20.226.61 104.20.227.61 104.20.238.36
104.20.239.36 104.20.24.19 104.20.246.85 104.20.247.85
104.20.248.17 104.20.249.17 104.20.28.88 104.20.29.88
104.20.32.71 104.20.37.241 104.20.38.241 104.20.7.23