Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.7.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34026
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.7.145.			IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:06:00 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 145.7.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.7.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.160.245.87 attackspam
SSH brute-force: detected 10 distinct usernames within a 24-hour window.
2020-05-01 05:45:51
178.128.21.32 attackbotsspam
$f2bV_matches
2020-05-01 05:39:49
191.254.210.207 attackspam
20/4/30@16:54:12: FAIL: Alarm-Intrusion address from=191.254.210.207
...
2020-05-01 06:03:38
218.92.0.212 attack
SSH brutforce
2020-05-01 05:52:38
153.52.112.65 attackspambots
2020-04-30T22:54:48.008343+02:00 lumpi kernel: [13569825.468075] INPUT:DROP:SPAMHAUS_DROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=153.52.112.65 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=65 ID=19785 DF PROTO=TCP SPT=65301 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2020-05-01 05:34:15
190.121.135.2 attackspam
Honeypot attack, port: 445, PTR: 1901211352.ip48.static.mediacommerce.com.co.
2020-05-01 05:55:25
23.95.128.53 attackspambots
(From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to outtenchiropractic.com?

The price is just $67 per link, via Paypal.

To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://justpaste.it/amazonbacklink

If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field, so we can get to your reply sooner.

Kind Regards,
Claudia
2020-05-01 05:52:04
192.162.70.66 attack
SSH Brute-Forcing (server1)
2020-05-01 05:31:42
103.3.226.166 attack
Invalid user lockout from 103.3.226.166 port 46697
2020-05-01 06:02:28
2.179.64.18 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-05-01 05:40:23
59.63.163.165 attackbots
Invalid user ts3bot from 59.63.163.165 port 18250
2020-05-01 06:09:10
185.101.218.123 attack
DATE:2020-04-30 22:54:37, IP:185.101.218.123, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-01 05:41:38
137.74.198.126 attack
$f2bV_matches
2020-05-01 05:34:40
124.158.147.21 attackspambots
Unauthorised access (Apr 30) SRC=124.158.147.21 LEN=52 TTL=116 ID=17067 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-01 05:55:07
216.119.106.225 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-01 05:32:14

Recently Reported IPs

104.20.68.57 104.20.68.7 104.20.69.7 104.20.68.32
104.20.68.247 104.21.66.98 104.20.69.236 104.20.69.238
104.20.68.236 104.20.7.18 104.20.7.67 104.20.70.238
104.20.7.200 104.20.70.100 104.20.70.13 104.20.7.81
104.20.70.166 104.20.70.89 104.21.67.100 104.20.7.72