Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.82.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36164
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.82.205.			IN	A

;; AUTHORITY SECTION:
.			313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:27:44 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 205.82.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 205.82.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.237.50.218 attackbotsspam
Invalid user admin from 41.237.50.218 port 37904
2020-04-29 23:55:48
176.59.7.226 attackspam
Unauthorized connection attempt from IP address 176.59.7.226 on Port 445(SMB)
2020-04-29 23:28:34
178.128.211.250 attackspam
Failed password for root from 178.128.211.250 port 53864 ssh2
2020-04-29 23:34:45
47.17.177.110 attack
Invalid user mmmmm from 47.17.177.110 port 44728
2020-04-29 23:54:35
106.12.5.190 attack
18441/tcp
[2020-04-29]1pkt
2020-04-29 23:20:41
101.231.250.22 attackbotsspam
Failed password for root from 101.231.250.22 port 22199 ssh2
2020-04-29 23:50:07
68.183.56.212 attack
$f2bV_matches
2020-04-29 23:21:14
183.61.5.84 attackbotsspam
Unauthorized connection attempt from IP address 183.61.5.84 on Port 445(SMB)
2020-04-29 23:15:01
58.33.49.196 attack
sshd jail - ssh hack attempt
2020-04-29 23:52:47
185.176.27.246 attackspam
04/29/2020-11:03:02.982292 185.176.27.246 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-29 23:14:15
1.192.121.238 attack
$f2bV_matches
2020-04-29 23:25:54
83.15.127.73 attackbotsspam
Invalid user vieregge from 83.15.127.73 port 43028
2020-04-29 23:20:55
180.76.136.81 attackbots
$f2bV_matches
2020-04-29 23:33:59
155.230.28.207 attackbotsspam
Apr 29 18:09:23 pkdns2 sshd\[28006\]: Invalid user romulo from 155.230.28.207Apr 29 18:09:25 pkdns2 sshd\[28006\]: Failed password for invalid user romulo from 155.230.28.207 port 42748 ssh2Apr 29 18:12:14 pkdns2 sshd\[28138\]: Failed password for root from 155.230.28.207 port 53774 ssh2Apr 29 18:14:59 pkdns2 sshd\[28207\]: Invalid user ubuntu from 155.230.28.207Apr 29 18:15:01 pkdns2 sshd\[28207\]: Failed password for invalid user ubuntu from 155.230.28.207 port 36574 ssh2Apr 29 18:17:51 pkdns2 sshd\[28353\]: Invalid user tomcat from 155.230.28.207Apr 29 18:17:53 pkdns2 sshd\[28353\]: Failed password for invalid user tomcat from 155.230.28.207 port 47606 ssh2
...
2020-04-29 23:37:02
198.211.122.197 attackbotsspam
Invalid user git from 198.211.122.197 port 60738
2020-04-29 23:31:06

Recently Reported IPs

104.20.82.247 104.20.82.188 104.20.82.224 104.20.83.188
104.20.83.156 104.20.84.105 104.20.84.46 104.18.182.52
104.20.84.54 104.20.83.178 104.20.83.72 104.20.84.72
104.20.85.130 104.20.85.46 104.20.84.130 104.20.85.105
104.20.83.224 104.20.85.22 104.20.85.158 104.20.86.108