Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.40.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.40.25.			IN	A

;; AUTHORITY SECTION:
.			470	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:05:02 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 25.40.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 25.40.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.174.193.247 attackbots
Automatic report - Port Scan Attack
2020-05-07 20:41:15
68.183.19.84 attackspam
May  7 14:35:12 vps639187 sshd\[21408\]: Invalid user admin from 68.183.19.84 port 49520
May  7 14:35:12 vps639187 sshd\[21408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.84
May  7 14:35:14 vps639187 sshd\[21408\]: Failed password for invalid user admin from 68.183.19.84 port 49520 ssh2
...
2020-05-07 20:49:39
51.38.128.30 attackspambots
May  7 13:53:56 Ubuntu-1404-trusty-64-minimal sshd\[9686\]: Invalid user zelia from 51.38.128.30
May  7 13:53:56 Ubuntu-1404-trusty-64-minimal sshd\[9686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.128.30
May  7 13:53:58 Ubuntu-1404-trusty-64-minimal sshd\[9686\]: Failed password for invalid user zelia from 51.38.128.30 port 43024 ssh2
May  7 14:02:09 Ubuntu-1404-trusty-64-minimal sshd\[20899\]: Invalid user nagios from 51.38.128.30
May  7 14:02:09 Ubuntu-1404-trusty-64-minimal sshd\[20899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.128.30
2020-05-07 20:39:49
187.75.125.240 attack
May  7 14:25:26 legacy sshd[14487]: Failed password for root from 187.75.125.240 port 56268 ssh2
May  7 14:31:06 legacy sshd[14675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.75.125.240
May  7 14:31:08 legacy sshd[14675]: Failed password for invalid user stu from 187.75.125.240 port 33586 ssh2
...
2020-05-07 20:56:31
180.76.155.19 attackspam
SSH auth scanning - multiple failed logins
2020-05-07 20:25:42
183.83.225.186 attackbotsspam
Unauthorized connection attempt from IP address 183.83.225.186 on Port 445(SMB)
2020-05-07 20:28:39
138.255.0.27 attackspam
May  7 14:02:13 [host] sshd[7890]: Invalid user he
May  7 14:02:13 [host] sshd[7890]: pam_unix(sshd:a
May  7 14:02:15 [host] sshd[7890]: Failed password
2020-05-07 20:29:27
198.54.126.140 attackbots
Automatic report - XMLRPC Attack
2020-05-07 20:36:04
68.187.220.146 attack
2020-05-07T08:54:12.217541sorsha.thespaminator.com sshd[1138]: Invalid user admin from 68.187.220.146 port 38670
2020-05-07T08:54:14.667671sorsha.thespaminator.com sshd[1138]: Failed password for invalid user admin from 68.187.220.146 port 38670 ssh2
...
2020-05-07 20:54:22
177.184.69.253 attackbots
Automatic report - Port Scan Attack
2020-05-07 20:26:15
198.54.114.76 attackspambots
IP blocked
2020-05-07 20:56:05
61.133.232.254 attackbotsspam
May  7 11:51:44 ns3033917 sshd[29119]: Invalid user kelvin from 61.133.232.254 port 9518
May  7 11:51:46 ns3033917 sshd[29119]: Failed password for invalid user kelvin from 61.133.232.254 port 9518 ssh2
May  7 12:02:24 ns3033917 sshd[29176]: Invalid user anuj from 61.133.232.254 port 16086
...
2020-05-07 20:20:46
167.114.203.73 attackbots
May  7 15:48:53 hosting sshd[27373]: Invalid user test001 from 167.114.203.73 port 38060
...
2020-05-07 20:50:09
51.83.76.139 attack
Automatic report - Banned IP Access
2020-05-07 20:24:24
87.251.74.172 attackspambots
May  7 14:40:01 debian-2gb-nbg1-2 kernel: \[11114087.048218\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.172 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=1489 PROTO=TCP SPT=42370 DPT=13618 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-07 20:49:20

Recently Reported IPs

104.20.40.71 104.20.41.137 104.20.40.6 104.20.41.149
104.20.43.114 104.20.41.244 104.21.66.73 104.20.42.137
104.20.44.114 104.20.44.126 104.20.43.141 104.20.41.6
104.20.44.205 104.20.45.205 104.20.45.126 104.20.44.7
104.20.45.164 104.20.45.28 104.21.66.74 104.20.45.47