Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.44.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.44.234.			IN	A

;; AUTHORITY SECTION:
.			152	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:27:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 234.44.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.44.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.220.158 attack
2020-08-26T14:45:27.393526n23.at postfix/smtps/smtpd[3187988]: warning: hostname zg-0823a-74.stretchoid.com does not resolve to address 192.241.220.158: Name or service not known
...
2020-08-27 01:08:00
64.227.125.204 attackbots
 TCP (SYN) 64.227.125.204:49506 -> port 19638, len 44
2020-08-27 01:03:05
184.105.247.231 attack
scans once in preceeding hours on the ports (in chronological order) 5353 resulting in total of 3 scans from 184.105.0.0/16 block.
2020-08-27 00:59:49
195.54.161.58 attackbots
scans 32 times in preceeding hours on the ports (in chronological order) 8688 8208 8033 8649 8018 50001 8796 8087 8814 49155 8092 8304 8986 3880 2222 5718 65000 8244 8486 17877 8673 8435 8970 64680 1072 1036 8652 2034 8563 8615 2020 8871 resulting in total of 78 scans from 195.54.160.0/23 block.
2020-08-27 00:33:10
195.54.167.89 attackbots
firewall-block, port(s): 12980/tcp, 12997/tcp
2020-08-27 00:31:07
1.203.161.226 attack
Aug 26 18:48:07 ip106 sshd[9359]: Failed password for root from 1.203.161.226 port 55886 ssh2
...
2020-08-27 01:03:51
192.241.226.148 attackspambots
scans once in preceeding hours on the ports (in chronological order) 4899 resulting in total of 38 scans from 192.241.128.0/17 block.
2020-08-27 00:54:10
94.102.49.114 attackbotsspam
firewall-block, port(s): 3500/tcp
2020-08-27 00:36:41
195.54.167.84 attackbots
SmallBizIT.US 4 packets to tcp(12384,12385,12388,12499)
2020-08-27 00:31:34
89.248.167.141 attackbotsspam
SmallBizIT.US 8 packets to tcp(2811,4099,5009,7797,8199,8551,9886,9922)
2020-08-27 00:38:39
192.241.227.80 attack
scans once in preceeding hours on the ports (in chronological order) 5986 resulting in total of 38 scans from 192.241.128.0/17 block.
2020-08-27 00:53:41
185.176.27.62 attack
SmallBizIT.US 3 packets to tcp(1212,4545,35389)
2020-08-27 00:58:53
89.248.167.131 attackspambots
Unauthorized connection attempt
IP: 89.248.167.131
Ports affected
    Message Submission (587) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS202425 IP Volume inc
   Netherlands (NL)
   CIDR 89.248.160.0/21
Log Date: 26/08/2020 3:54:00 PM UTC
2020-08-27 00:38:52
195.54.160.228 attack
SmallBizIT.US 6 packets to tcp(4489,5000,43389,53389,63389,65535)
2020-08-27 00:33:42
184.105.139.92 attack
scans once in preceeding hours on the ports (in chronological order) 30005 resulting in total of 3 scans from 184.105.0.0/16 block.
2020-08-27 01:00:26

Recently Reported IPs

104.20.44.212 104.20.44.128 104.20.44.241 104.20.43.241
104.20.42.175 104.20.45.128 104.20.45.213 104.20.45.187
104.20.45.169 104.20.45.234 104.18.180.66 104.20.45.94
104.20.45.212 104.20.46.94 104.20.46.248 104.20.44.91
104.20.48.173 104.20.47.173 104.20.49.121 104.20.47.248