Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.28.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24727
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.28.44.			IN	A

;; AUTHORITY SECTION:
.			412	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 16:53:05 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 44.28.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.28.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.194.116.11 attackspambots
Aug 27 14:11:18 mh1361109 sshd[20117]: Invalid user admin from 68.194.116.11
Aug 27 14:11:18 mh1361109 sshd[20117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.194.116.11
Aug 27 14:11:20 mh1361109 sshd[20117]: Failed password for invalid user admin from 68.194.116.11 port 55252 ssh2
Aug 27 14:14:44 mh1361109 sshd[20445]: Invalid user ubuntu from 68.194.116.11
Aug 27 14:14:44 mh1361109 sshd[20445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.194.116.11

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=68.194.116.11
2019-08-28 10:57:21
162.247.74.201 attackspambots
2019-08-28T02:33:54.908232abusebot.cloudsearch.cf sshd\[6863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kunstler.tor-exit.calyxinstitute.org  user=root
2019-08-28 10:41:49
216.244.66.234 attackspambots
login attempts
2019-08-28 10:30:12
134.209.34.30 attackspam
Aug 28 02:07:11 ncomp sshd[4125]: Invalid user master from 134.209.34.30
Aug 28 02:07:11 ncomp sshd[4125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.34.30
Aug 28 02:07:11 ncomp sshd[4125]: Invalid user master from 134.209.34.30
Aug 28 02:07:12 ncomp sshd[4125]: Failed password for invalid user master from 134.209.34.30 port 41816 ssh2
2019-08-28 10:19:28
202.10.79.168 attack
445/tcp 445/tcp 445/tcp...
[2019-06-27/08-27]10pkt,1pt.(tcp)
2019-08-28 11:01:24
159.89.170.154 attackspam
Aug 28 01:28:29 MK-Soft-VM7 sshd\[20109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.154  user=root
Aug 28 01:28:31 MK-Soft-VM7 sshd\[20109\]: Failed password for root from 159.89.170.154 port 60652 ssh2
Aug 28 01:33:07 MK-Soft-VM7 sshd\[20116\]: Invalid user guest from 159.89.170.154 port 49464
...
2019-08-28 10:33:16
157.230.97.200 attack
Automatic report - Banned IP Access
2019-08-28 10:25:35
196.234.145.245 attackbots
Attempted WordPress login: "GET /wp-login.php"
2019-08-28 10:27:34
198.108.67.57 attack
firewall-block, port(s): 9038/tcp
2019-08-28 10:15:28
209.17.96.210 attackbotsspam
Brute force attack stopped by firewall
2019-08-28 10:34:50
198.108.67.44 attack
6512/tcp 8602/tcp 3114/tcp...
[2019-06-26/08-27]111pkt,105pt.(tcp)
2019-08-28 10:40:54
117.7.236.85 attackbotsspam
Aug 27 21:27:27 h2177944 kernel: \[5257571.627966\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=117.7.236.85 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=847 DF PROTO=TCP SPT=52982 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 27 21:27:30 h2177944 kernel: \[5257574.681468\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=117.7.236.85 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=28750 DF PROTO=TCP SPT=52982 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 27 21:27:30 h2177944 kernel: \[5257575.021330\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=117.7.236.85 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=292 DF PROTO=TCP SPT=52982 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 27 21:27:35 h2177944 kernel: \[5257579.267269\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=117.7.236.85 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=13831 DF PROTO=TCP SPT=58449 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 27 21:27:38 h2177944 kernel: \[5257582.348706\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=117.7.236.85 DST=85.214.11
2019-08-28 11:00:37
190.156.190.39 attackbots
namecheap spam
2019-08-28 10:50:02
111.230.226.196 attackbotsspam
Aug 27 08:09:25 econome sshd[28966]: Failed password for invalid user chef from 111.230.226.196 port 49228 ssh2
Aug 27 08:09:26 econome sshd[28966]: Received disconnect from 111.230.226.196: 11: Bye Bye [preauth]
Aug 27 08:27:28 econome sshd[29891]: Failed password for invalid user film from 111.230.226.196 port 48522 ssh2
Aug 27 08:27:28 econome sshd[29891]: Received disconnect from 111.230.226.196: 11: Bye Bye [preauth]
Aug 27 08:31:22 econome sshd[30010]: Failed password for invalid user zori from 111.230.226.196 port 46956 ssh2
Aug 27 08:31:22 econome sshd[30010]: Received disconnect from 111.230.226.196: 11: Bye Bye [preauth]
Aug 27 08:35:11 econome sshd[30189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.196  user=r.r
Aug 27 08:35:13 econome sshd[30189]: Failed password for r.r from 111.230.226.196 port 45390 ssh2
Aug 27 08:35:13 econome sshd[30189]: Received disconnect from 111.230.226.196: 11: Bye Bye [prea........
-------------------------------
2019-08-28 10:38:57
187.1.27.126 attack
$f2bV_matches
2019-08-28 10:45:20

Recently Reported IPs

104.20.28.24 104.20.28.47 202.65.46.243 192.228.219.235
104.20.28.68 104.20.29.102 18.98.240.131 104.20.29.130
104.20.29.24 104.20.29.253 104.20.29.44 104.20.29.47
104.20.29.68 104.20.3.207 104.20.3.29 104.20.3.31
104.20.30.253 104.20.30.59 104.20.30.61 104.20.31.139