Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.71.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.71.9.			IN	A

;; AUTHORITY SECTION:
.			555	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032801 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 29 12:23:10 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 9.71.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.71.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.23.20 attackspam
Dec 26 11:27:27 MK-Soft-Root2 sshd[29374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.23.20 
Dec 26 11:27:29 MK-Soft-Root2 sshd[29374]: Failed password for invalid user ingetraut from 49.235.23.20 port 56466 ssh2
...
2019-12-26 19:26:47
114.112.58.134 attack
Unauthorized SSH login attempts
2019-12-26 19:38:59
122.160.122.49 attack
Dec 26 11:03:03 xeon sshd[12538]: Failed password for invalid user admin from 122.160.122.49 port 49964 ssh2
2019-12-26 19:22:17
139.155.26.91 attackspambots
Invalid user admin from 139.155.26.91 port 43692
2019-12-26 19:28:18
177.35.123.54 attack
Dec 26 10:19:39 XXX sshd[4919]: Invalid user gabriella from 177.35.123.54 port 49658
2019-12-26 19:21:54
170.238.156.30 attack
Absender hat Spam-Falle ausgel?st
2019-12-26 19:06:12
203.195.235.135 attack
[Aegis] @ 2019-12-26 09:49:09  0000 -> Multiple authentication failures.
2019-12-26 19:24:01
112.230.109.53 attackbots
FTP Brute Force
2019-12-26 19:34:03
134.175.191.248 attackspam
IP blocked
2019-12-26 19:29:06
113.190.196.35 attackbots
This IP Address sent many spam to @bit.co.id
mhamdanrifai@gmail.com is administrator
2019-12-26 19:24:24
58.52.245.223 attack
Scanning
2019-12-26 19:09:03
188.35.187.50 attack
Dec 26 01:01:13 web9 sshd\[3496\]: Invalid user ghersallah from 188.35.187.50
Dec 26 01:01:13 web9 sshd\[3496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.35.187.50
Dec 26 01:01:15 web9 sshd\[3496\]: Failed password for invalid user ghersallah from 188.35.187.50 port 36360 ssh2
Dec 26 01:03:48 web9 sshd\[3922\]: Invalid user manju from 188.35.187.50
Dec 26 01:03:48 web9 sshd\[3922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.35.187.50
2019-12-26 19:07:14
106.75.174.87 attack
$f2bV_matches_ltvn
2019-12-26 19:23:07
86.252.108.168 attackbots
Dec 26 12:32:41 www sshd\[20724\]: Invalid user guest from 86.252.108.168 port 39446
...
2019-12-26 19:35:28
159.203.197.31 attack
Unauthorized connection attempt detected from IP address 159.203.197.31 to port 4848
2019-12-26 19:15:36

Recently Reported IPs

104.20.71.156 104.20.76.120 104.20.77.123 104.20.78.118
104.20.78.120 104.20.78.123 104.20.81.21 104.20.82.21
104.20.96.134 104.20.98.179 104.20.99.247 104.200.144.98
104.200.18.161 104.200.18.240 104.200.20.80 104.200.31.22
104.201.49.7 104.206.212.233 104.207.130.176 104.207.134.98