Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.77.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.77.169.			IN	A

;; AUTHORITY SECTION:
.			231	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:27:36 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 169.77.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.77.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.190 attack
10/09/2019-23:39:19.124405 81.22.45.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-10 05:44:51
41.82.187.233 attackspam
Lines containing failures of 41.82.187.233
/var/log/apache/pucorp.org.log:41.82.187.233 - - [09/Oct/2019:21:27:55 +0200] "GET / HTTP/1.1" 301 636 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows NT; DigExt; DTS Agent"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.82.187.233
2019-10-10 05:22:11
195.181.168.138 attackbotsspam
\[2019-10-09 17:20:50\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '195.181.168.138:60738' - Wrong password
\[2019-10-09 17:20:50\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-09T17:20:50.104-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="370",SessionID="0x7fc3acd80118",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181.168.138/60738",Challenge="015f80b6",ReceivedChallenge="015f80b6",ReceivedHash="5ad5a77f3924d75408cf7c0e151ded23"
\[2019-10-09 17:22:07\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '195.181.168.138:58972' - Wrong password
\[2019-10-09 17:22:07\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-09T17:22:07.389-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="371",SessionID="0x7fc3ac5f2a78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181
2019-10-10 05:24:52
45.168.34.149 attackbotsspam
[Wed Oct  9 21:28:03 2019] Failed password for r.r from 45.168.34.149 port 51074 ssh2
[Wed Oct  9 21:28:07 2019] Failed password for r.r from 45.168.34.149 port 51074 ssh2
[Wed Oct  9 21:28:11 2019] Failed password for r.r from 45.168.34.149 port 51074 ssh2
[Wed Oct  9 21:28:14 2019] Failed password for r.r from 45.168.34.149 port 51074 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.168.34.149
2019-10-10 05:23:52
222.186.52.89 attack
2019-10-09T21:12:23.675581abusebot.cloudsearch.cf sshd\[29870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.89  user=root
2019-10-10 05:16:24
51.77.201.36 attackbotsspam
2019-10-09T20:15:35.920502abusebot-3.cloudsearch.cf sshd\[23164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu  user=root
2019-10-10 05:51:25
183.154.91.109 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-10 05:46:39
58.254.132.140 attackbotsspam
Oct  9 22:46:07 MK-Soft-VM6 sshd[22232]: Failed password for root from 58.254.132.140 port 50271 ssh2
...
2019-10-10 05:27:40
106.12.9.49 attackspam
Oct  9 22:46:19 bouncer sshd\[12332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.9.49  user=root
Oct  9 22:46:21 bouncer sshd\[12332\]: Failed password for root from 106.12.9.49 port 33748 ssh2
Oct  9 22:50:37 bouncer sshd\[12360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.9.49  user=root
...
2019-10-10 05:36:37
51.75.248.251 attackspam
10/09/2019-17:51:00.115403 51.75.248.251 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-10 05:51:38
119.48.16.182 attackspam
SSH invalid-user multiple login try
2019-10-10 05:32:00
103.215.80.171 attack
Automatic report - Port Scan
2019-10-10 05:39:53
103.21.218.242 attackspambots
Unauthorized SSH login attempts
2019-10-10 05:31:18
185.220.101.7 attackbots
xmlrpc attack
2019-10-10 05:36:20
197.50.11.137 attackspam
Honeypot attack, port: 23, PTR: host-197.50.11.137.tedata.net.
2019-10-10 05:34:40

Recently Reported IPs

104.18.182.228 104.20.73.182 104.20.77.13 104.20.76.13
104.20.78.169 104.20.78.243 104.20.78.25 104.20.77.9
104.20.79.202 104.20.77.25 104.20.8.73 104.20.79.94
104.20.8.69 104.20.80.202 104.20.77.243 104.20.80.94
104.18.182.233 104.20.81.202 104.20.8.127 104.20.81.247