Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.46.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.46.147.			IN	A

;; AUTHORITY SECTION:
.			565	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:43:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 147.46.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.46.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.169.252.215 attackbotsspam
" "
2019-09-27 16:18:34
68.100.119.84 attack
Sep 27 08:28:33 vps647732 sshd[7120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.100.119.84
Sep 27 08:28:35 vps647732 sshd[7120]: Failed password for invalid user vagrant from 68.100.119.84 port 33780 ssh2
...
2019-09-27 16:20:59
200.98.115.241 attackbotsspam
firewall-block, port(s): 445/tcp
2019-09-27 16:17:25
106.12.213.162 attackspam
2019-09-27T09:23:21.896702lon01.zurich-datacenter.net sshd\[6444\]: Invalid user cmschine from 106.12.213.162 port 33534
2019-09-27T09:23:21.901953lon01.zurich-datacenter.net sshd\[6444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.213.162
2019-09-27T09:23:24.406438lon01.zurich-datacenter.net sshd\[6444\]: Failed password for invalid user cmschine from 106.12.213.162 port 33534 ssh2
2019-09-27T09:29:13.581334lon01.zurich-datacenter.net sshd\[6605\]: Invalid user new from 106.12.213.162 port 57160
2019-09-27T09:29:13.587464lon01.zurich-datacenter.net sshd\[6605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.213.162
...
2019-09-27 16:23:45
145.239.102.181 attackspambots
Sep 27 07:06:33 tuotantolaitos sshd[27342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.102.181
Sep 27 07:06:35 tuotantolaitos sshd[27342]: Failed password for invalid user bailey from 145.239.102.181 port 42732 ssh2
...
2019-09-27 16:03:15
54.37.158.40 attackbots
Automatic report - Banned IP Access
2019-09-27 16:13:39
212.156.17.218 attackbots
Sep 27 10:09:27 MK-Soft-VM3 sshd[29927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.17.218 
Sep 27 10:09:30 MK-Soft-VM3 sshd[29927]: Failed password for invalid user codserver from 212.156.17.218 port 41148 ssh2
...
2019-09-27 16:24:49
139.162.116.22 attackbotsspam
firewall-block, port(s): 1755/tcp
2019-09-27 16:17:00
103.21.228.3 attack
[ssh] SSH attack
2019-09-27 16:08:36
185.173.35.53 attackbots
firewall-block, port(s): 8082/tcp
2019-09-27 16:12:00
181.143.72.66 attackbots
F2B jail: sshd. Time: 2019-09-27 09:42:39, Reported by: VKReport
2019-09-27 15:52:27
185.137.233.216 attackspam
09/27/2019-02:19:40.770567 185.137.233.216 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-27 16:25:44
79.137.72.121 attackspam
Sep 26 21:57:07 friendsofhawaii sshd\[886\]: Invalid user right from 79.137.72.121
Sep 26 21:57:07 friendsofhawaii sshd\[886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-79-137-72.eu
Sep 26 21:57:10 friendsofhawaii sshd\[886\]: Failed password for invalid user right from 79.137.72.121 port 42528 ssh2
Sep 26 22:01:25 friendsofhawaii sshd\[1280\]: Invalid user teamspeak from 79.137.72.121
Sep 26 22:01:25 friendsofhawaii sshd\[1280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-79-137-72.eu
2019-09-27 16:14:58
118.97.140.237 attack
Invalid user razeror from 118.97.140.237 port 39270
2019-09-27 15:49:48
79.109.239.218 attackspam
Sep 27 09:42:47 dedicated sshd[5647]: Invalid user srv from 79.109.239.218 port 34008
2019-09-27 16:02:59

Recently Reported IPs

104.20.45.125 104.20.45.38 104.20.46.193 9.227.105.169
104.20.57.252 104.20.57.186 104.20.57.169 104.20.66.247
104.20.65.247 104.200.18.99 104.207.138.189 104.207.230.148
104.207.230.244 104.207.226.163 104.207.226.172 104.207.242.58
104.207.244.16 104.21.12.174 104.208.89.232 104.207.250.103