Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.69.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.69.173.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:50:13 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 173.69.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 173.69.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
18.136.234.30 attack
Sep 14 22:51:18 xtremcommunity sshd\[94643\]: Invalid user smecher from 18.136.234.30 port 58660
Sep 14 22:51:18 xtremcommunity sshd\[94643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.136.234.30
Sep 14 22:51:19 xtremcommunity sshd\[94643\]: Failed password for invalid user smecher from 18.136.234.30 port 58660 ssh2
Sep 14 22:59:48 xtremcommunity sshd\[94840\]: Invalid user adonis from 18.136.234.30 port 44388
Sep 14 22:59:48 xtremcommunity sshd\[94840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.136.234.30
...
2019-09-15 11:15:25
157.230.109.166 attackspambots
Sep 14 22:22:04 ny01 sshd[10197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.109.166
Sep 14 22:22:06 ny01 sshd[10197]: Failed password for invalid user teamspeak3 from 157.230.109.166 port 48642 ssh2
Sep 14 22:25:39 ny01 sshd[11274]: Failed password for root from 157.230.109.166 port 60750 ssh2
2019-09-15 10:48:59
181.129.14.218 attackbotsspam
F2B jail: sshd. Time: 2019-09-15 04:59:59, Reported by: VKReport
2019-09-15 11:08:19
193.169.0.225 attackspam
[portscan] Port scan
2019-09-15 11:13:01
186.137.123.202 attackspam
Sep 15 04:01:35 XXX sshd[62320]: Invalid user olimex from 186.137.123.202 port 36690
2019-09-15 11:07:51
153.36.236.35 attackspam
2019-09-15T10:09:06.314347enmeeting.mahidol.ac.th sshd\[24631\]: User root from 153.36.236.35 not allowed because not listed in AllowUsers
2019-09-15T10:09:06.527369enmeeting.mahidol.ac.th sshd\[24631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
2019-09-15T10:09:08.538894enmeeting.mahidol.ac.th sshd\[24631\]: Failed password for invalid user root from 153.36.236.35 port 62830 ssh2
...
2019-09-15 11:11:49
192.3.177.213 attack
Invalid user admin from 192.3.177.213 port 44090
2019-09-15 10:55:07
123.207.96.242 attack
Sep 15 05:59:52 tuotantolaitos sshd[31349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.96.242
Sep 15 05:59:54 tuotantolaitos sshd[31349]: Failed password for invalid user vagrant from 123.207.96.242 port 10123 ssh2
...
2019-09-15 11:10:22
200.116.195.122 attackspam
Sep 14 11:46:12 home sshd[17296]: Invalid user subzero from 200.116.195.122 port 56854
Sep 14 11:46:12 home sshd[17296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.195.122
Sep 14 11:46:12 home sshd[17296]: Invalid user subzero from 200.116.195.122 port 56854
Sep 14 11:46:14 home sshd[17296]: Failed password for invalid user subzero from 200.116.195.122 port 56854 ssh2
Sep 14 11:59:07 home sshd[17343]: Invalid user wy from 200.116.195.122 port 42752
Sep 14 11:59:07 home sshd[17343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.195.122
Sep 14 11:59:07 home sshd[17343]: Invalid user wy from 200.116.195.122 port 42752
Sep 14 11:59:09 home sshd[17343]: Failed password for invalid user wy from 200.116.195.122 port 42752 ssh2
Sep 14 12:03:18 home sshd[17369]: Invalid user jk from 200.116.195.122 port 56304
Sep 14 12:03:18 home sshd[17369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
2019-09-15 10:40:35
39.82.202.111 attack
Sep 14 20:10:43 rpi sshd[411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.82.202.111 
Sep 14 20:10:45 rpi sshd[411]: Failed password for invalid user admin from 39.82.202.111 port 59197 ssh2
2019-09-15 10:59:11
142.93.69.223 attack
Sep 15 02:03:43 microserver sshd[17152]: Invalid user test from 142.93.69.223 port 39408
Sep 15 02:03:43 microserver sshd[17152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.69.223
Sep 15 02:03:46 microserver sshd[17152]: Failed password for invalid user test from 142.93.69.223 port 39408 ssh2
Sep 15 02:07:50 microserver sshd[17800]: Invalid user test from 142.93.69.223 port 55538
Sep 15 02:07:50 microserver sshd[17800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.69.223
Sep 15 02:20:06 microserver sshd[19451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.69.223  user=root
Sep 15 02:20:08 microserver sshd[19451]: Failed password for root from 142.93.69.223 port 46994 ssh2
Sep 15 02:24:13 microserver sshd[20042]: Invalid user stefan from 142.93.69.223 port 34678
Sep 15 02:24:13 microserver sshd[20042]: pam_unix(sshd:auth): authentication failure; logname= uid=0
2019-09-15 10:47:44
142.44.218.192 attack
Sep 14 20:07:35 SilenceServices sshd[23272]: Failed password for root from 142.44.218.192 port 48754 ssh2
Sep 14 20:11:37 SilenceServices sshd[24899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192
Sep 14 20:11:39 SilenceServices sshd[24899]: Failed password for invalid user jln from 142.44.218.192 port 33532 ssh2
2019-09-15 10:27:14
125.26.103.59 attackspambots
Automatic report - Port Scan Attack
2019-09-15 10:51:44
212.129.35.92 attack
Sep 14 16:26:59 vtv3 sshd\[15915\]: Invalid user sashure from 212.129.35.92 port 37240
Sep 14 16:26:59 vtv3 sshd\[15915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.35.92
Sep 14 16:27:01 vtv3 sshd\[15915\]: Failed password for invalid user sashure from 212.129.35.92 port 37240 ssh2
Sep 14 16:33:51 vtv3 sshd\[19296\]: Invalid user www from 212.129.35.92 port 41419
Sep 14 16:33:51 vtv3 sshd\[19296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.35.92
Sep 14 16:47:07 vtv3 sshd\[26254\]: Invalid user postgres from 212.129.35.92 port 58362
Sep 14 16:47:07 vtv3 sshd\[26254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.35.92
Sep 14 16:47:09 vtv3 sshd\[26254\]: Failed password for invalid user postgres from 212.129.35.92 port 58362 ssh2
Sep 14 16:51:34 vtv3 sshd\[28660\]: Invalid user coffee from 212.129.35.92 port 54603
Sep 14 16:51:34 vtv3 sshd\[28660
2019-09-15 10:39:47
190.146.40.67 attackspam
Sep 14 22:47:34 SilenceServices sshd[21235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.146.40.67
Sep 14 22:47:36 SilenceServices sshd[21235]: Failed password for invalid user ellort from 190.146.40.67 port 37876 ssh2
Sep 14 22:53:38 SilenceServices sshd[23509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.146.40.67
2019-09-15 11:01:55

Recently Reported IPs

101.109.22.248 104.20.68.230 104.20.69.230 104.20.67.213
104.20.7.191 104.20.71.133 104.20.70.133 104.20.7.114
104.20.7.34 104.20.71.163 101.109.22.251 104.20.74.38
104.20.68.213 104.20.74.178 104.20.72.185 104.20.75.104
104.20.72.163 104.200.137.130 104.200.109.242 104.200.137.137