Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.54.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.54.141.			IN	A

;; AUTHORITY SECTION:
.			116	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:05:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 141.54.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.54.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.186.82.206 attackspam
Unauthorized connection attempt from IP address 95.186.82.206 on Port 445(SMB)
2019-09-29 01:03:53
118.174.168.145 attackbots
2019-09-28T14:30:45.5160271240 sshd\[18694\]: Invalid user admin from 118.174.168.145 port 56705
2019-09-28T14:30:45.5185121240 sshd\[18694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.168.145
2019-09-28T14:30:46.9461911240 sshd\[18694\]: Failed password for invalid user admin from 118.174.168.145 port 56705 ssh2
...
2019-09-29 01:12:31
123.31.47.20 attackspambots
Sep 28 04:07:28 auw2 sshd\[23805\]: Invalid user english from 123.31.47.20
Sep 28 04:07:28 auw2 sshd\[23805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.47.20
Sep 28 04:07:31 auw2 sshd\[23805\]: Failed password for invalid user english from 123.31.47.20 port 50703 ssh2
Sep 28 04:13:51 auw2 sshd\[24476\]: Invalid user glassfish from 123.31.47.20
Sep 28 04:13:51 auw2 sshd\[24476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.47.20
2019-09-29 01:09:55
118.24.8.84 attackbotsspam
Sep 28 16:17:46 dedicated sshd[13826]: Invalid user Plainfield from 118.24.8.84 port 55476
2019-09-29 01:11:40
92.222.33.4 attackspambots
Automatic report - Banned IP Access
2019-09-29 01:30:23
193.227.16.26 attackbotsspam
Unauthorized connection attempt from IP address 193.227.16.26 on Port 445(SMB)
2019-09-29 01:02:40
198.54.113.226 attackspambots
xmlrpc attack
2019-09-29 01:15:50
106.12.14.254 attackbotsspam
Sep 28 18:58:40 markkoudstaal sshd[13431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.254
Sep 28 18:58:42 markkoudstaal sshd[13431]: Failed password for invalid user ovhuser from 106.12.14.254 port 60528 ssh2
Sep 28 19:03:50 markkoudstaal sshd[13966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.254
2019-09-29 01:18:10
89.248.162.168 attack
09/28/2019-12:59:10.173415 89.248.162.168 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-09-29 01:31:38
125.17.8.42 attack
Unauthorized connection attempt from IP address 125.17.8.42 on Port 445(SMB)
2019-09-29 01:06:38
192.227.252.17 attackbots
Sep 28 17:22:52 marvibiene sshd[17186]: Invalid user delia from 192.227.252.17 port 52408
Sep 28 17:22:52 marvibiene sshd[17186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.17
Sep 28 17:22:52 marvibiene sshd[17186]: Invalid user delia from 192.227.252.17 port 52408
Sep 28 17:22:54 marvibiene sshd[17186]: Failed password for invalid user delia from 192.227.252.17 port 52408 ssh2
...
2019-09-29 01:27:22
14.162.56.109 attackbotsspam
Unauthorized connection attempt from IP address 14.162.56.109 on Port 445(SMB)
2019-09-29 01:39:48
52.162.211.179 attackspambots
Brute force attack stopped by firewall
2019-09-29 01:37:30
134.209.35.246 attack
Sep 26 11:45:48 xb3 sshd[4128]: Failed password for invalid user fachwirt from 134.209.35.246 port 37370 ssh2
Sep 26 11:45:48 xb3 sshd[4128]: Received disconnect from 134.209.35.246: 11: Bye Bye [preauth]
Sep 26 11:52:51 xb3 sshd[11444]: Failed password for invalid user durand from 134.209.35.246 port 39890 ssh2
Sep 26 11:52:51 xb3 sshd[11444]: Received disconnect from 134.209.35.246: 11: Bye Bye [preauth]
Sep 26 11:57:02 xb3 sshd[9647]: Failed password for invalid user horizon from 134.209.35.246 port 54168 ssh2
Sep 26 11:57:02 xb3 sshd[9647]: Received disconnect from 134.209.35.246: 11: Bye Bye [preauth]
Sep 26 12:01:04 xb3 sshd[8548]: Failed password for invalid user teste from 134.209.35.246 port 40110 ssh2
Sep 26 12:01:04 xb3 sshd[8548]: Received disconnect from 134.209.35.246: 11: Bye Bye [preauth]
Sep 26 12:05:06 xb3 sshd[21887]: Failed password for invalid user sonar from 134.209.35.246 port 54498 ssh2
Sep 26 12:05:06 xb3 sshd[21887]: Received disconnect from 13........
-------------------------------
2019-09-29 01:48:23
196.33.165.170 attackspambots
xmlrpc attack
2019-09-29 01:04:08

Recently Reported IPs

104.20.53.242 104.20.53.175 104.20.56.104 104.20.54.56
104.20.54.44 104.20.56.215 104.20.56.13 104.20.57.13
104.20.57.215 104.20.57.104 104.21.66.87 104.20.57.237
104.20.57.39 104.20.58.248 104.20.58.138 104.20.56.39
104.20.58.237 104.20.57.56 104.20.58.56 104.20.59.11