Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.48.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.48.85.			IN	A

;; AUTHORITY SECTION:
.			139	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 09:31:29 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 85.48.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.48.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.172.110.226 attack
" "
2019-06-22 13:57:49
188.16.36.93 attackspam
Autoban   188.16.36.93 AUTH/CONNECT
2019-06-22 14:09:48
94.191.58.184 attack
719 attempts to GET/POST various PHPs
2019-06-22 13:44:45
128.199.221.18 attackspambots
Jun 22 07:05:07 localhost sshd\[22058\]: Invalid user fin from 128.199.221.18 port 48349
Jun 22 07:05:07 localhost sshd\[22058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.221.18
Jun 22 07:05:09 localhost sshd\[22058\]: Failed password for invalid user fin from 128.199.221.18 port 48349 ssh2
2019-06-22 13:44:06
201.16.166.120 attackspam
19/6/22@00:37:19: FAIL: Alarm-Intrusion address from=201.16.166.120
...
2019-06-22 14:12:01
134.209.10.41 attackspam
Jun 18 20:36:36 lola sshd[29716]: reveeclipse mapping checking getaddrinfo for zip.lst [134.209.10.41] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 18 20:36:36 lola sshd[29716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.10.41  user=r.r
Jun 18 20:36:38 lola sshd[29716]: Failed password for r.r from 134.209.10.41 port 38462 ssh2
Jun 18 20:36:38 lola sshd[29716]: Received disconnect from 134.209.10.41: 11: Bye Bye [preauth]
Jun 18 20:36:40 lola sshd[29718]: reveeclipse mapping checking getaddrinfo for zip.lst [134.209.10.41] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 18 20:36:40 lola sshd[29718]: Invalid user admin from 134.209.10.41
Jun 18 20:36:40 lola sshd[29718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.10.41 
Jun 18 20:36:42 lola sshd[29718]: Failed password for invalid user admin from 134.209.10.41 port 60312 ssh2
Jun 18 20:36:42 lola sshd[29718]: Received disconnect ........
-------------------------------
2019-06-22 14:14:09
218.64.216.56 attackspam
SMB Server BruteForce Attack
2019-06-22 14:19:46
157.55.39.18 attackspambots
Jun 22 04:38:43   TCP Attack: SRC=157.55.39.18 DST=[Masked] LEN=296 TOS=0x00 PREC=0x00 TTL=104  DF PROTO=TCP SPT=14011 DPT=80 WINDOW=64240 RES=0x00 ACK PSH URGP=0
2019-06-22 13:46:00
198.23.189.18 attackbotsspam
Automatic report - Web App Attack
2019-06-22 14:19:26
199.249.230.103 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.103  user=root
Failed password for root from 199.249.230.103 port 37822 ssh2
Failed password for root from 199.249.230.103 port 37822 ssh2
Failed password for root from 199.249.230.103 port 37822 ssh2
Failed password for root from 199.249.230.103 port 37822 ssh2
2019-06-22 14:00:56
182.74.169.98 attackspam
Invalid user ansible from 182.74.169.98 port 54436
2019-06-22 13:23:54
41.239.21.125 attackspambots
" "
2019-06-22 14:29:59
92.118.161.61 attackbots
3389BruteforceFW21
2019-06-22 14:28:16
27.158.48.170 attack
postfix-failedauth jail [dl]
2019-06-22 14:23:22
139.99.122.172 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 14:16:21

Recently Reported IPs

104.20.44.201 104.20.49.85 104.20.53.229 104.20.54.229
170.212.50.209 208.179.146.199 104.20.60.109 104.20.60.118
104.20.60.229 104.20.61.109 104.20.61.229 104.20.62.172
104.20.62.229 104.20.7.245 104.20.79.163 104.20.80.163
104.20.89.189 104.200.18.199 104.200.67.169 104.206.182.56