Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.39.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.39.214.			IN	A

;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:26:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 214.39.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.39.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
144.202.78.2 attackbotsspam
2019-09-08T09:49:48Z - RDP login failed multiple times. (144.202.78.2)
2019-09-08 19:19:21
122.225.200.114 attack
Sep  8 11:42:03 heicom postfix/smtpd\[15907\]: warning: unknown\[122.225.200.114\]: SASL LOGIN authentication failed: authentication failure
Sep  8 11:42:05 heicom postfix/smtpd\[15907\]: warning: unknown\[122.225.200.114\]: SASL LOGIN authentication failed: authentication failure
Sep  8 11:42:14 heicom postfix/smtpd\[15907\]: warning: unknown\[122.225.200.114\]: SASL LOGIN authentication failed: authentication failure
Sep  8 11:42:18 heicom postfix/smtpd\[15907\]: warning: unknown\[122.225.200.114\]: SASL LOGIN authentication failed: authentication failure
Sep  8 11:42:24 heicom postfix/smtpd\[15907\]: warning: unknown\[122.225.200.114\]: SASL LOGIN authentication failed: authentication failure
...
2019-09-08 19:47:09
123.21.146.248 attack
[portscan] Port scan
2019-09-08 19:25:22
190.116.49.2 attackspam
Sep  8 01:27:16 tdfoods sshd\[27274\]: Invalid user cactiuser from 190.116.49.2
Sep  8 01:27:16 tdfoods sshd\[27274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.116.49.2
Sep  8 01:27:19 tdfoods sshd\[27274\]: Failed password for invalid user cactiuser from 190.116.49.2 port 32822 ssh2
Sep  8 01:32:35 tdfoods sshd\[27655\]: Invalid user sail_ftp from 190.116.49.2
Sep  8 01:32:35 tdfoods sshd\[27655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.116.49.2
2019-09-08 19:46:53
184.154.189.94 attackbots
587/tcp 5985/tcp 3306/tcp...
[2019-07-11/09-08]14pkt,12pt.(tcp)
2019-09-08 19:17:08
103.92.209.3 attack
[SunSep0810:12:05.9692232019][:error][pid8839:tid47849210525440][client103.92.209.3:49672][client103.92.209.3]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"419"][id"330131"][rev"3"][msg"Atomicorp.comWAFRules:MaliciousBotBlocked\(FakeMozillaUserAgentStringDetected\)"][severity"CRITICAL"][hostname"planetescortgold.com"][uri"/wp-includes/SimplePie/Decode/HTML/media-admin.php"][unique_id"XXS31fZGdxpkuYLNWZKqZQAAAIU"]\,referer:planetescortgold.com[SunSep0810:12:07.0821702019][:error][pid30526:tid47849312130816][client103.92.209.3:57116][client103.92.209.3]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"419"][id"33013
2019-09-08 19:14:20
118.98.121.207 attackspam
2019-09-08T11:42:12.866368abusebot-8.cloudsearch.cf sshd\[8867\]: Invalid user christian from 118.98.121.207 port 56024
2019-09-08 20:03:12
151.80.46.40 attackspambots
$f2bV_matches_ltvn
2019-09-08 19:13:02
114.234.82.78 attackbotsspam
Automatic report - Port Scan Attack
2019-09-08 19:54:42
202.185.153.245 attackspam
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (789)
2019-09-08 19:45:43
167.71.250.105 attackspam
'Fail2Ban'
2019-09-08 19:48:45
51.254.33.188 attack
Sep  8 13:37:03 SilenceServices sshd[26865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.33.188
Sep  8 13:37:05 SilenceServices sshd[26865]: Failed password for invalid user steam from 51.254.33.188 port 60110 ssh2
Sep  8 13:41:29 SilenceServices sshd[28561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.33.188
2019-09-08 19:43:01
74.82.47.10 attack
50070/tcp 23/tcp 9200/tcp...
[2019-07-10/09-08]24pkt,13pt.(tcp),1pt.(udp)
2019-09-08 19:20:38
157.230.84.180 attackbotsspam
Sep  8 01:24:49 hcbb sshd\[4278\]: Invalid user odoo123 from 157.230.84.180
Sep  8 01:24:49 hcbb sshd\[4278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.84.180
Sep  8 01:24:51 hcbb sshd\[4278\]: Failed password for invalid user odoo123 from 157.230.84.180 port 39232 ssh2
Sep  8 01:28:59 hcbb sshd\[4584\]: Invalid user guestuser from 157.230.84.180
Sep  8 01:28:59 hcbb sshd\[4584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.84.180
2019-09-08 19:38:41
159.203.199.12 attack
27017/tcp 60001/tcp 2380/tcp...
[2019-09-06/07]4pkt,4pt.(tcp)
2019-09-08 19:57:37

Recently Reported IPs

104.20.38.164 104.20.39.235 104.20.39.118 104.20.38.99
104.20.39.78 104.20.4.245 104.20.4.184 104.20.39.99
104.20.4.3 104.20.4.29 104.18.18.95 104.20.40.125
40.224.5.15 104.20.40.115 104.20.40.153 104.20.40.213
104.20.4.67 104.20.41.121 104.20.40.235 104.20.41.115