Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.27.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.27.45.			IN	A

;; AUTHORITY SECTION:
.			245	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:55:00 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 45.27.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.27.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.163.8.108 attackspambots
Jul 22 19:38:46 ns381471 sshd[26754]: Failed password for backup from 221.163.8.108 port 43350 ssh2
2020-07-23 02:13:36
167.250.189.255 attackbotsspam
Automatic report - Port Scan Attack
2020-07-23 02:04:19
54.37.235.183 attack
*Port Scan* detected from 54.37.235.183 (PL/Poland/Lower Silesia/Wroc?aw (Krzyki)/183.ip-54-37-235.eu). 4 hits in the last 290 seconds
2020-07-23 01:59:40
216.218.206.67 attackspam
 TCP (SYN) 216.218.206.67:55507 -> port 11211, len 44
2020-07-23 02:28:04
101.32.1.249 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-23 01:54:00
178.239.116.142 attackspam
xmlrpc attack
2020-07-23 02:08:21
174.219.17.6 attackbots
Brute forcing email accounts
2020-07-23 01:59:21
180.76.158.139 attack
(sshd) Failed SSH login from 180.76.158.139 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 22 20:06:05 elude sshd[28040]: Invalid user ssha from 180.76.158.139 port 42020
Jul 22 20:06:07 elude sshd[28040]: Failed password for invalid user ssha from 180.76.158.139 port 42020 ssh2
Jul 22 20:12:16 elude sshd[29087]: Invalid user server from 180.76.158.139 port 50554
Jul 22 20:12:18 elude sshd[29087]: Failed password for invalid user server from 180.76.158.139 port 50554 ssh2
Jul 22 20:14:52 elude sshd[29473]: Invalid user tnt from 180.76.158.139 port 52516
2020-07-23 02:15:46
36.75.228.225 attackspam
Jul 20 20:18:51 web1 sshd[11520]: Invalid user python from 36.75.228.225
Jul 20 20:18:51 web1 sshd[11520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.75.228.225 
Jul 20 20:18:53 web1 sshd[11520]: Failed password for invalid user python from 36.75.228.225 port 56190 ssh2
Jul 20 20:18:54 web1 sshd[11520]: Received disconnect from 36.75.228.225: 11: Bye Bye [preauth]
Jul 20 20:19:53 web1 sshd[11536]: Invalid user joseph from 36.75.228.225
Jul 20 20:19:53 web1 sshd[11536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.75.228.225 
Jul 20 20:19:56 web1 sshd[11536]: Failed password for invalid user joseph from 36.75.228.225 port 38846 ssh2
Jul 20 20:19:56 web1 sshd[11536]: Received disconnect from 36.75.228.225: 11: Bye Bye [preauth]
Jul 20 20:20:55 web1 sshd[11924]: Invalid user munoz from 36.75.228.225
Jul 20 20:20:55 web1 sshd[11924]: pam_unix(sshd:auth): authentication failure; log........
-------------------------------
2020-07-23 02:17:04
52.178.134.11 attackspambots
SSH Brute Force
2020-07-23 01:54:14
83.118.194.4 attackspambots
Jul 22 11:03:14 ny01 sshd[30514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.118.194.4
Jul 22 11:03:16 ny01 sshd[30514]: Failed password for invalid user job from 83.118.194.4 port 38436 ssh2
Jul 22 11:07:51 ny01 sshd[31165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.118.194.4
2020-07-23 01:58:22
211.170.61.184 attackspam
Jul 22 20:16:34 journals sshd\[94329\]: Invalid user ibmadm from 211.170.61.184
Jul 22 20:16:34 journals sshd\[94329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.170.61.184
Jul 22 20:16:36 journals sshd\[94329\]: Failed password for invalid user ibmadm from 211.170.61.184 port 32256 ssh2
Jul 22 20:20:17 journals sshd\[94677\]: Invalid user jira from 211.170.61.184
Jul 22 20:20:17 journals sshd\[94677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.170.61.184
...
2020-07-23 02:29:09
223.247.194.43 attackspambots
Jul 22 16:42:15 Ubuntu-1404-trusty-64-minimal sshd\[18916\]: Invalid user prisma from 223.247.194.43
Jul 22 16:42:15 Ubuntu-1404-trusty-64-minimal sshd\[18916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.194.43
Jul 22 16:42:18 Ubuntu-1404-trusty-64-minimal sshd\[18916\]: Failed password for invalid user prisma from 223.247.194.43 port 44364 ssh2
Jul 22 16:49:17 Ubuntu-1404-trusty-64-minimal sshd\[23004\]: Invalid user gsq from 223.247.194.43
Jul 22 16:49:17 Ubuntu-1404-trusty-64-minimal sshd\[23004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.194.43
2020-07-23 02:21:02
222.244.167.38 attackspambots
Telnet Server BruteForce Attack
2020-07-23 02:28:56
46.105.149.168 attackbots
Jul 22 14:29:50 XXXXXX sshd[55034]: Invalid user user1 from 46.105.149.168 port 51188
2020-07-23 02:11:02

Recently Reported IPs

107.161.76.75 107.161.80.18 107.161.76.47 107.161.78.221
107.161.88.2 107.161.78.213 107.161.91.159 3.16.102.12
107.161.80.34 107.162.129.115 107.162.134.151 107.161.91.135
107.162.139.247 107.162.137.10 104.20.27.55 107.162.140.49
107.162.145.160 107.162.134.54 107.162.142.45 107.162.143.254