Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.227.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.227.113.			IN	A

;; AUTHORITY SECTION:
.			221	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041201 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 13 10:50:29 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 113.227.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.227.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.90.168.207 attack
23/tcp
[2019-06-23]1pkt
2019-06-24 03:43:11
219.149.225.154 attackspambots
$f2bV_matches
2019-06-24 03:41:05
213.180.203.15 attackspambots
[Sun Jun 23 16:42:56.786955 2019] [:error] [pid 28535:tid 139996908435200] [client 213.180.203.15:61612] [client 213.180.203.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/crs/owasp-modsecurity-crs-3.1.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "792"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.1.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XQ9JoPvwQAlUwLg-dsxHlwAAABE"]
...
2019-06-24 03:46:38
46.229.168.149 attackspambots
Malicious Traffic/Form Submission
2019-06-24 03:19:05
115.59.18.4 attack
23/tcp
[2019-06-23]1pkt
2019-06-24 03:25:32
157.55.39.24 attack
Jun 23 12:19:54   TCP Attack: SRC=157.55.39.24 DST=[Masked] LEN=296 TOS=0x00 PREC=0x00 TTL=103  DF PROTO=TCP SPT=1268 DPT=80 WINDOW=64240 RES=0x00 ACK PSH URGP=0
2019-06-24 03:23:12
23.236.152.99 attack
Automatic report - Web App Attack
2019-06-24 03:16:00
128.199.118.27 attackbots
Automatic report - Web App Attack
2019-06-24 03:31:19
14.165.111.209 attackbots
Jun 23 11:09:51 Serveur sshd[26047]: Did not receive identification string from 14.165.111.209 port 60184
Jun 23 11:11:44 Serveur sshd[27502]: Received disconnect from 14.165.111.209 port 60976:11: Bye Bye [preauth]
Jun 23 11:11:44 Serveur sshd[27502]: Disconnected from 14.165.111.209 port 60976 [preauth]
Jun 23 11:23:29 Serveur sshd[3116]: Invalid user admin from 14.165.111.209 port 33786
Jun 23 11:23:29 Serveur sshd[3116]: Failed password for invalid user admin from 14.165.111.209 port 33786 ssh2
Jun 23 11:23:29 Serveur sshd[3116]: Received disconnect from 14.165.111.209 port 33786:11: Bye Bye [preauth]
Jun 23 11:23:29 Serveur sshd[3116]: Disconnected from invalid user admin 14.165.111.209 port 33786 [preauth]
Jun 23 11:25:13 Serveur sshd[4511]: Invalid user ubuntu from 14.165.111.209 port 34290
Jun 23 11:25:13 Serveur sshd[4511]: Failed password for invalid user ubuntu from 14.165.111.209 port 34290 ssh2
Jun 23 11:25:13 Serveur sshd[4511]: Received disconnect from 14........
-------------------------------
2019-06-24 03:18:31
34.83.84.105 attackbots
34.83.84.105 - - \[23/Jun/2019:14:54:26 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
34.83.84.105 - - \[23/Jun/2019:14:54:27 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
34.83.84.105 - - \[23/Jun/2019:14:54:27 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
34.83.84.105 - - \[23/Jun/2019:14:54:28 +0200\] "POST /wp-login.php HTTP/1.1" 200 1631 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
34.83.84.105 - - \[23/Jun/2019:14:54:29 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
34.83.84.105 - - \[23/Jun/2019:14:54:29 +0200\] "POST /wp-login.php HTTP/1.1" 200 1630 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/
2019-06-24 03:24:44
85.38.164.51 attackspambots
Jun 23 18:50:40 [munged] sshd[13624]: Invalid user device from 85.38.164.51 port 50162
Jun 23 18:50:40 [munged] sshd[13624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.38.164.51
2019-06-24 03:34:17
129.122.16.156 attackbots
Automatic report - Web App Attack
2019-06-24 03:51:17
112.85.42.88 attackbots
SSH Brute Force, server-1 sshd[28802]: Failed password for root from 112.85.42.88 port 23069 ssh2
2019-06-24 03:32:20
1.190.14.76 attackbots
23/tcp
[2019-06-23]1pkt
2019-06-24 03:48:55
2.139.176.35 attackbots
Automatic report - Web App Attack
2019-06-24 03:13:05

Recently Reported IPs

104.20.223.119 104.20.230.228 104.20.233.111 104.20.240.176
104.20.241.215 104.20.244.235 104.20.26.29 104.20.27.29
104.20.31.135 104.20.33.135 104.20.37.24 104.20.38.24
104.20.45.144 104.20.46.144 104.20.51.213 104.20.51.32
104.20.57.170 104.20.62.87 104.20.72.14 104.20.72.234