Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.68.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.68.169.			IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:05:54 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 169.68.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.68.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.32.223.32 attackbots
Dec 21 15:14:31 XXX sshd[6294]: Invalid user dovecot from 118.32.223.32 port 59070
2019-12-22 02:56:48
58.144.150.135 attackbotsspam
58.144.150.135 - - \[21/Dec/2019:15:52:02 +0100\] "GET /goip/cron.htm HTTP/1.1" 403 459 "-" "Mozilla/4.0 \(compatible\; MSIE 7.0\; Windows NT 6.1\; WOW64\; Trident/5.0\; SLCC2\; .NET CLR 2.0.50727\; .NET CLR 3.5.30729\; .NET CLR 3.0.30729\; Media Center PC 6.0\; .NET4.0C\; .NET4.0E\; InfoPath.3\; KB974488\)"
58.144.150.135 - - \[21/Dec/2019:15:52:02 +0100\] "GET / HTTP/1.1" 403 446 "-" "Mozilla/4.0 \(compatible\; MSIE 7.0\; Windows NT 6.1\; WOW64\; Trident/5.0\; SLCC2\; .NET CLR 2.0.50727\; .NET CLR 3.5.30729\; .NET CLR 3.0.30729\; Media Center PC 6.0\; .NET4.0C\; .NET4.0E\; InfoPath.3\; KB974488\)"
58.144.150.135 - - \[21/Dec/2019:15:52:03 +0100\] "GET /index.html\?findcli=-1 HTTP/1.1" 403 456 "-" "Mozilla/4.0 \(compatible\; MSIE 7.0\; Windows NT 6.1\; WOW64\; Trident/5.0\; SLCC2\; .NET CLR 2.0.50727\; .NET CLR 3.5.30729\; .NET CLR 3.0.30729\; Media Center PC 6.0\; .NET4.0C\; .NET4.0E\; InfoPath.3\; KB974488\)"
...
2019-12-22 03:00:40
106.12.88.165 attackbots
SSH brutforce
2019-12-22 03:06:03
51.38.33.178 attack
Dec  1 04:56:55 microserver sshd[24071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.33.178  user=root
Dec  1 04:56:57 microserver sshd[24071]: Failed password for root from 51.38.33.178 port 42167 ssh2
Dec  1 04:59:41 microserver sshd[24227]: Invalid user napoleoni from 51.38.33.178 port 59534
Dec  1 04:59:41 microserver sshd[24227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.33.178
Dec  1 04:59:43 microserver sshd[24227]: Failed password for invalid user napoleoni from 51.38.33.178 port 59534 ssh2
Dec  1 05:10:44 microserver sshd[26114]: Invalid user schoettle from 51.38.33.178 port 44305
Dec  1 05:10:44 microserver sshd[26114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.33.178
Dec  1 05:10:46 microserver sshd[26114]: Failed password for invalid user schoettle from 51.38.33.178 port 44305 ssh2
Dec  1 05:13:36 microserver sshd[26301]: Invalid user jouanny fro
2019-12-22 02:52:03
62.234.68.246 attackspambots
Dec 21 08:25:18 eddieflores sshd\[27314\]: Invalid user veen from 62.234.68.246
Dec 21 08:25:18 eddieflores sshd\[27314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.246
Dec 21 08:25:20 eddieflores sshd\[27314\]: Failed password for invalid user veen from 62.234.68.246 port 59069 ssh2
Dec 21 08:30:52 eddieflores sshd\[27832\]: Invalid user moorhty from 62.234.68.246
Dec 21 08:30:52 eddieflores sshd\[27832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.246
2019-12-22 02:42:07
185.34.52.108 attack
Dec 21 18:57:18 h2177944 kernel: \[149839.402837\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.34.52.108 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=56 ID=21602 DF PROTO=TCP SPT=37566 DPT=110 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 21 18:57:18 h2177944 kernel: \[149839.402850\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.34.52.108 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=56 ID=21602 DF PROTO=TCP SPT=37566 DPT=110 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 21 18:57:19 h2177944 kernel: \[149840.405335\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.34.52.108 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=56 ID=21603 DF PROTO=TCP SPT=37566 DPT=110 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 21 18:57:19 h2177944 kernel: \[149840.405347\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.34.52.108 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=56 ID=21603 DF PROTO=TCP SPT=37566 DPT=110 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 21 18:57:21 h2177944 kernel: \[149842.409040\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.34.52.108 DST=85.214.11
2019-12-22 02:50:52
148.251.120.201 attack
Automated report (2019-12-21T16:18:38+00:00). Misbehaving bot detected at this address.
2019-12-22 02:56:24
185.156.73.52 attackbotsspam
12/21/2019-13:35:22.509191 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-22 02:36:32
61.92.169.178 attack
2019-12-21T18:32:02.083655shield sshd\[10946\]: Invalid user minimum from 61.92.169.178 port 57888
2019-12-21T18:32:02.088092shield sshd\[10946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061092169178.static.ctinets.com
2019-12-21T18:32:03.806170shield sshd\[10946\]: Failed password for invalid user minimum from 61.92.169.178 port 57888 ssh2
2019-12-21T18:37:34.226949shield sshd\[13373\]: Invalid user mysql from 61.92.169.178 port 34436
2019-12-21T18:37:34.241699shield sshd\[13373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061092169178.static.ctinets.com
2019-12-22 02:42:24
193.31.24.113 attackspambots
12/21/2019-19:25:39.000626 193.31.24.113 Protocol: 17 ET INFO Session Traversal Utilities for NAT (STUN Binding Request)
2019-12-22 02:37:44
5.135.135.116 attackspambots
Dec 21 05:02:32 wbs sshd\[31314\]: Invalid user fuqua from 5.135.135.116
Dec 21 05:02:32 wbs sshd\[31314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=garage.neezzmail.com
Dec 21 05:02:34 wbs sshd\[31314\]: Failed password for invalid user fuqua from 5.135.135.116 port 32768 ssh2
Dec 21 05:08:00 wbs sshd\[31821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=garage.neezzmail.com  user=root
Dec 21 05:08:02 wbs sshd\[31821\]: Failed password for root from 5.135.135.116 port 35075 ssh2
2019-12-22 03:08:38
94.135.162.210 attackbots
Dec 21 19:03:35 ns3042688 sshd\[12134\]: Invalid user aronstam from 94.135.162.210
Dec 21 19:03:35 ns3042688 sshd\[12134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.135.162.210 
Dec 21 19:03:36 ns3042688 sshd\[12134\]: Failed password for invalid user aronstam from 94.135.162.210 port 39750 ssh2
Dec 21 19:08:48 ns3042688 sshd\[14877\]: Invalid user esrever from 94.135.162.210
Dec 21 19:08:48 ns3042688 sshd\[14877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.135.162.210 
...
2019-12-22 02:43:05
51.68.230.54 attackbotsspam
Dec 21 19:16:54 nextcloud sshd\[22247\]: Invalid user user3 from 51.68.230.54
Dec 21 19:16:54 nextcloud sshd\[22247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.54
Dec 21 19:16:56 nextcloud sshd\[22247\]: Failed password for invalid user user3 from 51.68.230.54 port 50238 ssh2
...
2019-12-22 02:49:28
136.144.225.182 attackspambots
Message ID	
Created at:	Fri, Dec 20, 2019 at 3:47 PM (Delivered after 5 seconds)
From:	Amour Feel Super-Team  Using WhatCounts
To:	
Subject:	𝓣𝓱𝓮𝔂 𝓪𝓻𝓮 𝓼𝓸 𝓼𝓮𝓭𝓾𝓬𝓽𝓲𝓿𝓮... 𝓨𝓸𝓾 𝔀𝓸𝓷'𝓽 𝓫𝓮 𝓪𝓫𝓵𝓮 𝓽𝓸 𝓻𝓮𝓼𝓲𝓼𝓽 𝓽𝓱𝓮𝓶
SPF:	NEUTRAL with IP 136.144.225.182 Learn more
DKIM:	'PASS' with domain ruicci.accincing.com
ARC-Authentication-Results: i=1; mx.google.com;
       dkim=pass header.i=@ruicci.accincing.com header.s=default header.b=ua0PWwlq;
       spf=neutral (google.com: 136.144.225.182 is neither permitted nor denied by best guess record for domain of return@chacha.com) smtp.mailfrom=Return@chacha.com
Return-Path: 
Received: from ruicci.accincing.com (ruicci.accincing.com. [136.144.225.182])
        by mx.google.com with ESMTP id c10si8148718edv.360.2019.12.20.13.47.59
2019-12-22 02:37:06
119.29.119.151 attackspam
Dec 21 16:53:41 dedicated sshd[7065]: Invalid user visage from 119.29.119.151 port 45344
2019-12-22 02:46:31

Recently Reported IPs

104.20.67.95 104.21.66.95 104.20.68.183 104.20.68.207
104.20.69.100 104.20.68.57 104.20.7.145 104.20.68.7
104.20.69.7 104.20.68.32 104.20.68.247 104.21.66.98
104.20.69.236 104.20.69.238 104.20.68.236 104.20.7.18
104.20.7.67 104.20.70.238 104.20.7.200 104.20.70.100