Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.3.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.3.51.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 07:08:12 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 51.3.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.3.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.233.130.189 attackspam
Jul 14 01:08:26 localhost kernel: [14325099.316039] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.233.130.189 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=39651 PROTO=TCP SPT=30326 DPT=37215 WINDOW=9772 RES=0x00 SYN URGP=0 
Jul 14 01:08:26 localhost kernel: [14325099.316073] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.233.130.189 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=39651 PROTO=TCP SPT=30326 DPT=37215 SEQ=758669438 ACK=0 WINDOW=9772 RES=0x00 SYN URGP=0 
Jul 14 06:25:45 localhost kernel: [14344139.138312] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.233.130.189 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=51207 PROTO=TCP SPT=30326 DPT=37215 WINDOW=9772 RES=0x00 SYN URGP=0 
Jul 14 06:25:45 localhost kernel: [14344139.138334] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.233.130.189 DST=[mungedIP2] LEN=40 TOS=0x
2019-07-15 02:21:52
60.241.23.58 attackspam
Jul 14 18:58:00 mail sshd\[22683\]: Invalid user de from 60.241.23.58 port 60527
Jul 14 18:58:00 mail sshd\[22683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.241.23.58
Jul 14 18:58:03 mail sshd\[22683\]: Failed password for invalid user de from 60.241.23.58 port 60527 ssh2
Jul 14 19:05:57 mail sshd\[24240\]: Invalid user ts3 from 60.241.23.58 port 60354
Jul 14 19:05:57 mail sshd\[24240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.241.23.58
2019-07-15 01:42:45
188.93.235.226 attack
Jul 14 19:46:02 ubuntu-2gb-nbg1-dc3-1 sshd[2282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.93.235.226
Jul 14 19:46:05 ubuntu-2gb-nbg1-dc3-1 sshd[2282]: Failed password for invalid user sarah from 188.93.235.226 port 36554 ssh2
...
2019-07-15 02:12:05
92.118.37.84 attack
Jul 14 18:02:12 mail kernel: [3625178.209436] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.84 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=37360 PROTO=TCP SPT=41610 DPT=17663 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 14 18:04:32 mail kernel: [3625317.775653] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.84 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=38360 PROTO=TCP SPT=41610 DPT=34683 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 14 18:05:52 mail kernel: [3625398.109082] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.84 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=64925 PROTO=TCP SPT=41610 DPT=29158 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 14 18:08:59 mail kernel: [3625584.999941] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.84 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=4205 PROTO=TCP SPT=41610 DPT=25267 WINDOW=1024 RES=0x00 SYN U
2019-07-15 02:24:09
185.84.189.229 attackbots
[portscan] Port scan
2019-07-15 02:06:26
213.32.69.98 attackspambots
Jul 14 19:53:17 bouncer sshd\[28214\]: Invalid user jasmine from 213.32.69.98 port 34534
Jul 14 19:53:17 bouncer sshd\[28214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.69.98 
Jul 14 19:53:19 bouncer sshd\[28214\]: Failed password for invalid user jasmine from 213.32.69.98 port 34534 ssh2
...
2019-07-15 02:05:04
112.85.42.189 attack
Jul 14 14:10:37 vmi181237 sshd\[18937\]: refused connect from 112.85.42.189 \(112.85.42.189\)
Jul 14 14:12:09 vmi181237 sshd\[18959\]: refused connect from 112.85.42.189 \(112.85.42.189\)
Jul 14 14:13:24 vmi181237 sshd\[18971\]: refused connect from 112.85.42.189 \(112.85.42.189\)
Jul 14 14:14:39 vmi181237 sshd\[18992\]: refused connect from 112.85.42.189 \(112.85.42.189\)
Jul 14 14:15:51 vmi181237 sshd\[19007\]: refused connect from 112.85.42.189 \(112.85.42.189\)
2019-07-15 02:36:08
117.27.76.215 attack
Jul 13 00:56:05 localhost kernel: [14237958.816738] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=117.27.76.215 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=46 ID=1528 PROTO=TCP SPT=36690 DPT=37215 WINDOW=46745 RES=0x00 SYN URGP=0 
Jul 13 00:56:05 localhost kernel: [14237958.816760] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=117.27.76.215 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=46 ID=1528 PROTO=TCP SPT=36690 DPT=37215 SEQ=758669438 ACK=0 WINDOW=46745 RES=0x00 SYN URGP=0 
Jul 14 06:25:44 localhost kernel: [14344137.867781] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=117.27.76.215 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=3503 PROTO=TCP SPT=39107 DPT=2323 WINDOW=48785 RES=0x00 SYN URGP=0 
Jul 14 06:25:44 localhost kernel: [14344137.867809] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=117.27.76.215 DST=[mungedIP2] LEN=40 TOS=0x00 PR
2019-07-15 02:23:45
113.172.101.72 attack
Brute force attempt
2019-07-15 01:55:39
112.85.42.88 attackbotsspam
Jul 14 20:21:34 s64-1 sshd[15882]: Failed password for root from 112.85.42.88 port 25993 ssh2
Jul 14 20:22:31 s64-1 sshd[15893]: Failed password for root from 112.85.42.88 port 58091 ssh2
...
2019-07-15 02:25:24
185.77.171.124 attackbots
Jul 14 11:47:22 shared06 sshd[21451]: Invalid user admin from 185.77.171.124
Jul 14 11:47:22 shared06 sshd[21451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.77.171.124
Jul 14 11:47:24 shared06 sshd[21451]: Failed password for invalid user admin from 185.77.171.124 port 52912 ssh2
Jul 14 11:47:25 shared06 sshd[21451]: Connection closed by 185.77.171.124 port 52912 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.77.171.124
2019-07-15 02:34:14
210.245.26.174 attackspam
123/udp 123/udp 123/udp...
[2019-05-15/07-14]35pkt,1pt.(udp)
2019-07-15 02:03:56
91.121.211.59 attackbots
Jul 14 17:43:08 MK-Soft-VM6 sshd\[4446\]: Invalid user jin from 91.121.211.59 port 56530
Jul 14 17:43:08 MK-Soft-VM6 sshd\[4446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59
Jul 14 17:43:10 MK-Soft-VM6 sshd\[4446\]: Failed password for invalid user jin from 91.121.211.59 port 56530 ssh2
...
2019-07-15 02:03:33
176.255.56.214 attackspam
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-14 17:34:40]
2019-07-15 02:05:38
91.226.83.220 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-15 01:42:24

Recently Reported IPs

44.238.0.222 123.156.147.200 104.20.30.106 7.204.226.89
104.20.30.155 104.20.30.219 104.20.30.25 104.20.30.84
104.20.31.155 104.20.31.25 104.20.33.20 104.20.33.250
104.20.34.111 104.20.34.20 211.43.126.127 104.20.34.250
104.20.35.111 30.0.164.101 60.100.127.17 104.20.36.232