Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.20.212.42 spambots
Vr network
2023-03-18 06:45:21
104.20.2.253 attackbotsspam
TCP Port Scanning
2020-03-12 04:40:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.2.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.2.246.			IN	A

;; AUTHORITY SECTION:
.			130	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 135 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 09:29:52 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 246.2.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 246.2.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.43.6.211 attackspam
Unauthorized connection attempt detected from IP address 103.43.6.211 to port 445
2019-12-13 21:57:19
118.24.7.98 attack
Invalid user midkiff from 118.24.7.98 port 39396
2019-12-13 21:53:25
34.73.39.215 attack
$f2bV_matches
2019-12-13 21:57:32
92.118.37.61 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 89 - port: 5028 proto: TCP cat: Misc Attack
2019-12-13 21:34:28
91.106.193.72 attackspam
ssh failed login
2019-12-13 21:51:10
178.62.224.96 attackspambots
Invalid user coe from 178.62.224.96 port 49229
2019-12-13 21:52:01
193.32.161.113 attackspam
SIP/5060 Probe, BF, Hack -
2019-12-13 21:53:51
222.186.180.6 attackspambots
Dec 13 19:42:09 areeb-Workstation sshd[2885]: Failed password for root from 222.186.180.6 port 15282 ssh2
Dec 13 19:42:30 areeb-Workstation sshd[2885]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 15282 ssh2 [preauth]
...
2019-12-13 22:12:48
45.136.108.65 attack
Microsoft Windows Terminal server RDP over non-standard port attempt
2019-12-13 21:48:24
1.0.160.64 attackspambots
1576222995 - 12/13/2019 08:43:15 Host: 1.0.160.64/1.0.160.64 Port: 445 TCP Blocked
2019-12-13 21:48:56
112.215.236.190 attack
1576222977 - 12/13/2019 08:42:57 Host: 112.215.236.190/112.215.236.190 Port: 445 TCP Blocked
2019-12-13 22:10:07
183.82.116.191 attackspam
Unauthorized connection attempt detected from IP address 183.82.116.191 to port 445
2019-12-13 21:36:00
14.111.93.93 attackbotsspam
2019-12-13T02:01:33.290301-07:00 suse-nuc sshd[22839]: Invalid user getuiza from 14.111.93.93 port 57488
...
2019-12-13 22:11:46
89.208.246.240 attackspam
$f2bV_matches
2019-12-13 22:04:13
177.69.237.53 attackspam
Invalid user rachieru from 177.69.237.53 port 49318
2019-12-13 21:50:22

Recently Reported IPs

104.20.19.145 104.20.20.145 104.20.210.106 238.217.56.212
104.20.230.52 52.143.6.50 104.20.231.52 104.20.24.139
104.20.244.77 75.107.97.21 104.20.245.77 104.20.25.139
104.20.28.104 104.20.28.239 104.20.29.104 104.20.3.246
104.20.31.109 104.20.33.31 104.20.34.14 36.84.31.212