Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.40.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.40.57.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 02:52:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 57.40.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.40.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.129.64.202 attackspam
GET /wp-config.php.old HTTP/1.1
2020-08-07 03:51:57
62.210.25.243 attackspam
62.210.25.243 - - [06/Aug/2020:19:29:23 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 04:02:41
102.133.163.203 attackbots
X-Sender-IP: 102.133.163.203
X-SID-PRA: ALLIEDMOVENUC@QUOTE.TOASCYN0.COM
X-SID-Result: NONE
X-MS-Exchange-Organization-PCL: 2
X-Microsoft-Antispam: BCL:0;
X-Forefront-Antispam-Report:
CIP:102.133.163.203;CTRY:ZA;LANG:en;SCL:0;SRV:;IPV:NLI;SFV:NSPM;H:CustomercomSatisfactlionoplusoffersUyxgb.com;PTR:InfoDomainNonexistent;CAT:NONE;SFTY:;SFS:;DIR:INB;SFP:;
X-OriginatorOrg: outlook.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Aug 2020 09:34:30.3634
(UTC)
2020-08-07 04:00:29
195.176.3.23 attackbotsspam
Unwanted checking 80 or 443 port
...
2020-08-07 03:52:16
3.8.124.207 attackbots
GET /.git/HEAD HTTP/1.1
2020-08-07 04:04:29
85.248.227.164 attack
GET /wp-config.php.orig HTTP/1.1
2020-08-07 03:47:46
45.89.66.28 attack
GET /wp-config.bak HTTP/1.1
2020-08-07 03:50:31
179.191.123.46 attack
firewall-block, port(s): 18037/tcp
2020-08-07 04:01:42
60.169.77.181 attack
firewall-block, port(s): 1433/tcp
2020-08-07 03:33:41
199.249.230.79 attackbotsspam
GET /wp-config.php_original HTTP/1.1
2020-08-07 03:51:29
198.100.145.89 attackspam
198.100.145.89 - - [06/Aug/2020:20:28:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2178 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.100.145.89 - - [06/Aug/2020:20:28:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2154 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.100.145.89 - - [06/Aug/2020:20:28:06 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 03:58:39
45.14.150.26 attackspambots
firewall-block, port(s): 11211/tcp
2020-08-07 04:01:22
156.96.156.138 attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 12 - port: 8080 proto: tcp cat: Misc Attackbytes: 60
2020-08-07 04:03:44
5.32.175.72 attackspambots
GET /wp-login.php HTTP/1.1
2020-08-07 04:03:58
185.220.100.255 attack
ModSecurity detections (a)
2020-08-07 04:07:01

Recently Reported IPs

104.20.39.57 104.20.4.100 104.20.49.22 104.20.49.223
104.20.49.44 104.20.50.22 104.20.50.223 104.20.50.44
104.20.5.100 104.20.59.180 104.20.60.251 104.20.60.101
104.20.62.101 104.20.61.22 104.20.60.180 104.20.62.22
104.20.61.251 104.20.63.101 104.20.66.164 104.20.65.164