Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.221.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.221.73.			IN	A

;; AUTHORITY SECTION:
.			386	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 16:49:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 73.221.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.221.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.169.125 attackspambots
Apr 16 14:59:55 meumeu sshd[4981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.125 
Apr 16 14:59:57 meumeu sshd[4981]: Failed password for invalid user oracle from 159.89.169.125 port 46568 ssh2
Apr 16 15:04:03 meumeu sshd[5707]: Failed password for root from 159.89.169.125 port 52944 ssh2
...
2020-04-17 00:39:26
88.214.26.39 attack
Unauthorized connection attempt detected from IP address 88.214.26.39 to port 3308
2020-04-17 01:11:55
37.59.125.163 attackspambots
$f2bV_matches
2020-04-17 00:32:49
49.88.112.76 attackbotsspam
Apr 16 23:31:16 webhost01 sshd[11253]: Failed password for root from 49.88.112.76 port 33506 ssh2
...
2020-04-17 00:45:47
201.68.159.129 attackspam
Automatic report - Port Scan Attack
2020-04-17 00:56:50
88.209.217.106 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-04-17 00:43:02
68.34.8.214 attackbots
TCP src-port=36120   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (187)
2020-04-17 00:57:29
50.2.25.105 attackspam
Automatic report - XMLRPC Attack
2020-04-17 00:58:16
41.79.196.244 attack
Automatic report BANNED IP
2020-04-17 01:00:57
49.232.95.250 attackbots
$lgm
2020-04-17 00:44:54
37.49.226.183 attack
Invalid user admin from 37.49.226.183 port 36262
2020-04-17 00:36:53
47.61.211.84 attackspambots
1587039087 - 04/16/2020 14:11:27 Host: 47.61.211.84/47.61.211.84 Port: 445 TCP Blocked
2020-04-17 01:09:31
218.94.103.226 attackspambots
Apr 16 05:12:01 mockhub sshd[23624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.103.226
Apr 16 05:12:03 mockhub sshd[23624]: Failed password for invalid user uz from 218.94.103.226 port 46724 ssh2
...
2020-04-17 00:29:07
37.59.52.44 attackspambots
37.59.52.44 - - \[16/Apr/2020:08:22:19 -0400\] "GET /wp-login.php HTTP/1.1" 200 1814 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
37.59.52.44 - - \[16/Apr/2020:08:22:20 -0400\] "POST /wp-login.php HTTP/1.1" 200 2248 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-04-17 00:40:37
114.30.77.218 attackbotsspam
SMB Server BruteForce Attack
2020-04-17 01:05:47

Recently Reported IPs

215.60.180.82 104.20.223.111 104.20.224.111 104.20.224.26
104.20.225.26 104.20.227.118 104.20.228.118 104.20.228.29
104.20.228.5 104.20.229.111 104.20.229.112 251.221.137.5
104.20.229.29 104.20.229.5 104.20.23.252 104.20.23.68
104.20.23.96 104.20.230.111 104.20.230.112 104.20.232.13