Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.204.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.204.19.			IN	A

;; AUTHORITY SECTION:
.			41	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:49:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 19.204.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.204.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.124.148.196 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-10 07:27:33,397 INFO [amun_request_handler] PortScan Detected on Port: 445 (92.124.148.196)
2019-07-10 22:05:00
187.14.140.68 attackspam
WordPress XMLRPC scan :: 187.14.140.68 0.100 BYPASS [10/Jul/2019:19:18:10  1000] [censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
2019-07-10 22:11:04
203.128.246.226 attack
445/tcp 445/tcp 445/tcp...
[2019-05-13/07-10]5pkt,1pt.(tcp)
2019-07-10 22:40:04
198.108.67.34 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 22:04:10
190.186.198.18 attackspam
SMB Server BruteForce Attack
2019-07-10 22:12:12
125.64.94.211 attack
10.07.2019 13:36:13 Connection to port 79 blocked by firewall
2019-07-10 22:31:55
89.219.26.226 attack
445/tcp 445/tcp 445/tcp...
[2019-05-24/07-10]8pkt,1pt.(tcp)
2019-07-10 22:13:32
185.220.101.31 attackbotsspam
Malicious Traffic/Form Submission
2019-07-10 22:00:11
49.231.222.1 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-10 07:26:56,969 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.231.222.1)
2019-07-10 22:14:21
103.215.221.195 attackbots
Automatic report generated by Wazuh
2019-07-10 22:53:55
58.251.18.94 attack
Jul 10 13:33:08 [host] sshd[5583]: Invalid user app from 58.251.18.94
Jul 10 13:33:08 [host] sshd[5583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.251.18.94
Jul 10 13:33:10 [host] sshd[5583]: Failed password for invalid user app from 58.251.18.94 port 53449 ssh2
2019-07-10 22:05:30
51.89.153.12 attackspambots
SIP Server BruteForce Attack
2019-07-10 22:44:44
66.154.111.36 attack
Trojan.Gen-SH
2019-07-10 22:25:49
37.114.134.159 attackspambots
Honeypot hit.
2019-07-10 22:29:13
118.172.169.56 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-10 10:46:30]
2019-07-10 23:03:13

Recently Reported IPs

101.109.22.174 104.20.203.9 123.252.253.190 104.20.203.27
104.20.209.5 104.20.209.62 104.20.211.109 104.20.203.62
104.20.212.109 104.20.208.62 101.109.22.180 104.20.202.9
104.20.215.134 104.20.208.5 104.20.216.134 104.20.22.42
104.20.22.146 104.20.234.42 104.20.223.3 101.109.22.183