Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.80.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.80.202.			IN	A

;; AUTHORITY SECTION:
.			312	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:27:40 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 202.80.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 202.80.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.89.151.214 attackbotsspam
$f2bV_matches
2019-12-02 16:32:58
185.93.248.242 attack
$f2bV_matches
2019-12-02 16:24:33
222.186.173.238 attackspambots
Dec  2 09:01:42 nextcloud sshd\[12782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Dec  2 09:01:43 nextcloud sshd\[12782\]: Failed password for root from 222.186.173.238 port 55398 ssh2
Dec  2 09:02:00 nextcloud sshd\[13143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
...
2019-12-02 16:12:54
157.245.62.87 attackspam
xmlrpc attack
2019-12-02 16:10:46
163.172.207.104 attackbotsspam
\[2019-12-02 03:04:44\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-02T03:04:44.871-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="22011972592277524",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/53265",ACLName="no_extension_match"
\[2019-12-02 03:08:45\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-02T03:08:45.944-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="33011972592277524",SessionID="0x7f26c429d578",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/51483",ACLName="no_extension_match"
\[2019-12-02 03:12:32\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-02T03:12:32.149-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="44011972592277524",SessionID="0x7f26c429d578",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/53310",ACL
2019-12-02 16:38:35
176.159.57.134 attackbotsspam
Sep 30 01:41:38 vtv3 sshd[14116]: Failed password for invalid user omegafez from 176.159.57.134 port 41014 ssh2
Sep 30 01:52:11 vtv3 sshd[19240]: Invalid user ubnt from 176.159.57.134 port 48066
Sep 30 01:52:11 vtv3 sshd[19240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.159.57.134
Sep 30 01:52:13 vtv3 sshd[19240]: Failed password for invalid user ubnt from 176.159.57.134 port 48066 ssh2
Sep 30 01:55:42 vtv3 sshd[21091]: Invalid user rox from 176.159.57.134 port 59828
Sep 30 01:55:42 vtv3 sshd[21091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.159.57.134
Sep 30 02:06:20 vtv3 sshd[26344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.159.57.134  user=nobody
Sep 30 02:06:22 vtv3 sshd[26344]: Failed password for nobody from 176.159.57.134 port 38650 ssh2
Sep 30 02:09:51 vtv3 sshd[27847]: Invalid user service from 176.159.57.134 port 50412
Sep 30 02:09:51 vtv3 sshd[27847]
2019-12-02 16:16:35
106.54.48.29 attackspambots
Dec  2 02:24:22 srv01 sshd[11913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.48.29  user=r.r
Dec  2 02:24:24 srv01 sshd[11913]: Failed password for r.r from 106.54.48.29 port 54008 ssh2
Dec  2 02:24:24 srv01 sshd[11913]: Received disconnect from 106.54.48.29: 11: Bye Bye [preauth]
Dec  2 02:31:51 srv01 sshd[12282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.48.29  user=r.r
Dec  2 02:31:53 srv01 sshd[12282]: Failed password for r.r from 106.54.48.29 port 40000 ssh2
Dec  2 02:31:54 srv01 sshd[12282]: Received disconnect from 106.54.48.29: 11: Bye Bye [preauth]
Dec  2 02:39:14 srv01 sshd[12593]: Invalid user sula from 106.54.48.29
Dec  2 02:39:14 srv01 sshd[12593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.48.29 
Dec  2 02:39:16 srv01 sshd[12593]: Failed password for invalid user sula from 106.54.48.29 port 49642 ssh2........
-------------------------------
2019-12-02 16:28:49
51.91.8.146 attackbots
Dec  2 09:26:50 markkoudstaal sshd[8298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.8.146
Dec  2 09:26:52 markkoudstaal sshd[8298]: Failed password for invalid user willy from 51.91.8.146 port 44060 ssh2
Dec  2 09:32:22 markkoudstaal sshd[8792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.8.146
2019-12-02 16:37:24
218.26.176.3 attackspam
Unauthorised access (Dec  2) SRC=218.26.176.3 LEN=40 TTL=239 ID=16151 TCP DPT=1433 WINDOW=1024 SYN
2019-12-02 16:36:12
106.12.120.155 attack
2019-12-02T07:21:24.805517vps751288.ovh.net sshd\[28901\]: Invalid user admin from 106.12.120.155 port 40388
2019-12-02T07:21:24.814760vps751288.ovh.net sshd\[28901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.155
2019-12-02T07:21:26.911740vps751288.ovh.net sshd\[28901\]: Failed password for invalid user admin from 106.12.120.155 port 40388 ssh2
2019-12-02T07:28:59.765940vps751288.ovh.net sshd\[28962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.155  user=root
2019-12-02T07:29:01.657505vps751288.ovh.net sshd\[28962\]: Failed password for root from 106.12.120.155 port 51200 ssh2
2019-12-02 16:17:41
92.249.143.33 attack
Dec  2 09:40:45 microserver sshd[55239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.249.143.33  user=root
Dec  2 09:40:47 microserver sshd[55239]: Failed password for root from 92.249.143.33 port 48089 ssh2
Dec  2 09:46:52 microserver sshd[56114]: Invalid user buch from 92.249.143.33 port 53847
Dec  2 09:46:52 microserver sshd[56114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.249.143.33
Dec  2 09:46:54 microserver sshd[56114]: Failed password for invalid user buch from 92.249.143.33 port 53847 ssh2
Dec  2 09:58:45 microserver sshd[57871]: Invalid user guest from 92.249.143.33 port 37108
Dec  2 09:58:45 microserver sshd[57871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.249.143.33
Dec  2 09:58:46 microserver sshd[57871]: Failed password for invalid user guest from 92.249.143.33 port 37108 ssh2
Dec  2 10:04:46 microserver sshd[58745]: pam_unix(sshd:auth): authenticatio
2019-12-02 16:43:25
118.24.89.243 attack
Dec  2 08:33:03 MK-Soft-VM8 sshd[15463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.89.243 
Dec  2 08:33:05 MK-Soft-VM8 sshd[15463]: Failed password for invalid user zlsj123 from 118.24.89.243 port 37218 ssh2
...
2019-12-02 16:26:58
112.85.42.174 attackbots
Dec  2 09:29:59 MK-Soft-VM6 sshd[6193]: Failed password for root from 112.85.42.174 port 6936 ssh2
Dec  2 09:30:05 MK-Soft-VM6 sshd[6193]: Failed password for root from 112.85.42.174 port 6936 ssh2
...
2019-12-02 16:30:29
109.105.30.121 attackspambots
Honeypot attack, port: 23, PTR: 109-105-30-121.naracom.hu.
2019-12-02 16:12:08
218.92.0.170 attackspambots
Dec  2 05:42:33 firewall sshd[2970]: Failed password for root from 218.92.0.170 port 52293 ssh2
Dec  2 05:42:36 firewall sshd[2970]: Failed password for root from 218.92.0.170 port 52293 ssh2
Dec  2 05:42:39 firewall sshd[2970]: Failed password for root from 218.92.0.170 port 52293 ssh2
...
2019-12-02 16:44:32

Recently Reported IPs

104.20.8.69 104.20.77.243 104.20.80.94 104.18.182.233
104.20.81.202 104.20.8.127 104.20.81.247 104.20.8.199
104.20.82.178 104.20.82.156 104.20.81.205 104.20.82.202
104.20.82.247 104.20.82.205 104.20.82.188 104.20.82.224
104.20.83.188 104.20.83.156 104.20.84.105 104.20.84.46