Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.83.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.83.74.			IN	A

;; AUTHORITY SECTION:
.			101	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:10:43 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 74.83.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.83.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.241.101.127 attackspambots
Aug  7 11:45:16 mail sshd\[18565\]: Failed password for invalid user admin from 189.241.101.127 port 53246 ssh2
Aug  7 12:04:20 mail sshd\[18756\]: Invalid user richer from 189.241.101.127 port 37242
...
2019-08-07 19:08:34
222.165.195.75 attackspambots
Autoban   222.165.195.75 AUTH/CONNECT
2019-08-07 19:26:47
119.146.145.104 attackspam
Aug  7 06:40:14 xtremcommunity sshd\[20603\]: Invalid user sqladmin from 119.146.145.104 port 2710
Aug  7 06:40:14 xtremcommunity sshd\[20603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104
Aug  7 06:40:17 xtremcommunity sshd\[20603\]: Failed password for invalid user sqladmin from 119.146.145.104 port 2710 ssh2
Aug  7 06:44:53 xtremcommunity sshd\[20756\]: Invalid user tex from 119.146.145.104 port 2711
Aug  7 06:44:53 xtremcommunity sshd\[20756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104
...
2019-08-07 19:20:25
187.180.165.124 attackspam
Aug  7 11:29:26 rpi sshd[32385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.180.165.124 
Aug  7 11:29:28 rpi sshd[32385]: Failed password for invalid user ftp from 187.180.165.124 port 54524 ssh2
2019-08-07 19:34:30
13.71.4.106 attackspambots
Aug  7 08:59:12 ms-srv sshd[30331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.4.106  user=root
Aug  7 08:59:14 ms-srv sshd[30331]: Failed password for invalid user root from 13.71.4.106 port 48458 ssh2
2019-08-07 19:43:02
203.100.87.75 attack
Automatic report - Port Scan Attack
2019-08-07 19:41:14
46.166.151.47 attack
\[2019-08-07 07:05:05\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-07T07:05:05.244-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0046812400638",SessionID="0x7ff4d0160998",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/53351",ACLName="no_extension_match"
\[2019-08-07 07:09:56\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-07T07:09:56.180-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="001146406820923",SessionID="0x7ff4d0160998",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/59537",ACLName="no_extension_match"
\[2019-08-07 07:10:09\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-07T07:10:09.593-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="81046406829453",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/61184",ACLName="no_extens
2019-08-07 19:22:38
202.85.220.177 attackbots
Aug  7 06:57:41 sshgateway sshd\[860\]: Invalid user deploy from 202.85.220.177
Aug  7 06:57:41 sshgateway sshd\[860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.85.220.177
Aug  7 06:57:44 sshgateway sshd\[860\]: Failed password for invalid user deploy from 202.85.220.177 port 39080 ssh2
2019-08-07 19:06:02
124.207.187.139 attackbots
Aug  7 10:18:49 lnxweb61 sshd[14990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.187.139
2019-08-07 19:12:09
132.232.52.35 attackbots
Aug  7 10:24:51 MK-Soft-VM6 sshd\[16701\]: Invalid user hara from 132.232.52.35 port 50062
Aug  7 10:24:51 MK-Soft-VM6 sshd\[16701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.52.35
Aug  7 10:24:53 MK-Soft-VM6 sshd\[16701\]: Failed password for invalid user hara from 132.232.52.35 port 50062 ssh2
...
2019-08-07 19:03:29
186.121.243.218 attack
3389BruteforceFW22
2019-08-07 19:15:15
165.227.182.180 attackspam
Automatic report - Banned IP Access
2019-08-07 19:13:12
185.220.102.4 attackbotsspam
Aug  7 10:34:41 vpn01 sshd\[5455\]: Invalid user admin from 185.220.102.4
Aug  7 10:34:41 vpn01 sshd\[5455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.4
Aug  7 10:34:43 vpn01 sshd\[5455\]: Failed password for invalid user admin from 185.220.102.4 port 35355 ssh2
2019-08-07 19:46:48
117.239.128.188 attack
[portscan] tcp/23 [TELNET]
*(RWIN=3795)(08071017)
2019-08-07 19:16:51
187.37.1.171 attackbotsspam
Aug  7 08:51:36 MK-Soft-Root2 sshd\[4185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.37.1.171  user=root
Aug  7 08:51:38 MK-Soft-Root2 sshd\[4185\]: Failed password for root from 187.37.1.171 port 11137 ssh2
Aug  7 08:57:52 MK-Soft-Root2 sshd\[5031\]: Invalid user vinod from 187.37.1.171 port 33793
Aug  7 08:57:52 MK-Soft-Root2 sshd\[5031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.37.1.171
...
2019-08-07 19:02:29

Recently Reported IPs

104.20.86.171 104.20.86.207 104.20.88.229 104.20.85.171
104.20.86.252 104.20.86.244 104.20.87.252 104.20.9.21
104.20.85.207 104.20.87.229 104.244.126.160 104.20.87.244
104.20.90.39 104.20.9.3 104.20.91.54 104.20.91.39
104.20.93.170 104.20.91.176 104.20.92.26 104.20.92.176