Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.89.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.89.113.			IN	A

;; AUTHORITY SECTION:
.			146	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:06:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 113.89.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.89.20.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.94.18.2 attackspam
Mar 21 23:05:50 lukav-desktop sshd\[19058\]: Invalid user moana from 190.94.18.2
Mar 21 23:05:50 lukav-desktop sshd\[19058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.94.18.2
Mar 21 23:05:52 lukav-desktop sshd\[19058\]: Failed password for invalid user moana from 190.94.18.2 port 36692 ssh2
Mar 21 23:10:12 lukav-desktop sshd\[23789\]: Invalid user k from 190.94.18.2
Mar 21 23:10:12 lukav-desktop sshd\[23789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.94.18.2
2020-03-22 05:57:07
175.6.248.104 attackspambots
firewall-block, port(s): 60001/tcp
2020-03-22 05:55:36
49.233.75.234 attack
5x Failed Password
2020-03-22 05:58:33
106.13.97.228 attackbotsspam
20 attempts against mh-ssh on echoip
2020-03-22 05:39:38
167.172.171.234 attackspam
Mar 21 22:23:37 srv-ubuntu-dev3 sshd[58554]: Invalid user maintenance from 167.172.171.234
Mar 21 22:23:37 srv-ubuntu-dev3 sshd[58554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.171.234
Mar 21 22:23:37 srv-ubuntu-dev3 sshd[58554]: Invalid user maintenance from 167.172.171.234
Mar 21 22:23:40 srv-ubuntu-dev3 sshd[58554]: Failed password for invalid user maintenance from 167.172.171.234 port 56726 ssh2
Mar 21 22:28:21 srv-ubuntu-dev3 sshd[59293]: Invalid user fast from 167.172.171.234
Mar 21 22:28:21 srv-ubuntu-dev3 sshd[59293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.171.234
Mar 21 22:28:21 srv-ubuntu-dev3 sshd[59293]: Invalid user fast from 167.172.171.234
Mar 21 22:28:23 srv-ubuntu-dev3 sshd[59293]: Failed password for invalid user fast from 167.172.171.234 port 48280 ssh2
Mar 21 22:32:52 srv-ubuntu-dev3 sshd[60130]: Invalid user hadoop from 167.172.171.234
...
2020-03-22 05:46:32
222.186.175.23 attackspam
Mar 21 22:28:14 dcd-gentoo sshd[5397]: User root from 222.186.175.23 not allowed because none of user's groups are listed in AllowGroups
Mar 21 22:28:16 dcd-gentoo sshd[5397]: error: PAM: Authentication failure for illegal user root from 222.186.175.23
Mar 21 22:28:14 dcd-gentoo sshd[5397]: User root from 222.186.175.23 not allowed because none of user's groups are listed in AllowGroups
Mar 21 22:28:16 dcd-gentoo sshd[5397]: error: PAM: Authentication failure for illegal user root from 222.186.175.23
Mar 21 22:28:14 dcd-gentoo sshd[5397]: User root from 222.186.175.23 not allowed because none of user's groups are listed in AllowGroups
Mar 21 22:28:16 dcd-gentoo sshd[5397]: error: PAM: Authentication failure for illegal user root from 222.186.175.23
Mar 21 22:28:16 dcd-gentoo sshd[5397]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.23 port 35473 ssh2
...
2020-03-22 05:30:43
94.102.56.215 attackspambots
94.102.56.215 was recorded 20 times by 11 hosts attempting to connect to the following ports: 40748,40751. Incident counter (4h, 24h, all-time): 20, 128, 8483
2020-03-22 05:59:26
45.95.168.164 attackbotsspam
Mar 21 22:15:34 mail.srvfarm.net postfix/smtpd[277035]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 21 22:15:34 mail.srvfarm.net postfix/smtpd[277035]: lost connection after AUTH from go.goldsteelllc.tech[45.95.168.164]
Mar 21 22:18:27 mail.srvfarm.net postfix/smtpd[276998]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 21 22:18:27 mail.srvfarm.net postfix/smtpd[277262]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 21 22:18:27 mail.srvfarm.net postfix/smtpd[276998]: lost connection after AUTH from go.goldsteelllc.tech[45.95.168.164]
Mar 21 22:18:27 mail.srvfarm.net postfix/smtpd[277262]: lost connection after AUTH from go.goldsteelllc.tech[45.95.168.164]
2020-03-22 05:47:14
93.51.11.154 attackbotsspam
93.51.11.154 - - [21/Mar/2020:22:10:21 +0100] "GET /cgi-bin/hi3510/getidentify.cgi HTTP/1.1" 302 435 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)"
2020-03-22 05:47:26
190.181.60.2 attackbots
Mar 21 18:02:10 firewall sshd[27734]: Invalid user nq from 190.181.60.2
Mar 21 18:02:11 firewall sshd[27734]: Failed password for invalid user nq from 190.181.60.2 port 34928 ssh2
Mar 21 18:10:20 firewall sshd[28252]: Invalid user jenkinsssh from 190.181.60.2
...
2020-03-22 05:48:05
45.143.220.230 attackspambots
[2020-03-21 17:10:46] NOTICE[1148] chan_sip.c: Registration from '"303" ' failed for '45.143.220.230:5255' - Wrong password
[2020-03-21 17:10:46] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-21T17:10:46.563-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="303",SessionID="0x7fd82c43c848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.230/5255",Challenge="31ed3a56",ReceivedChallenge="31ed3a56",ReceivedHash="cb6a5e0ac1d89016dea8416895c9e610"
[2020-03-21 17:10:46] NOTICE[1148] chan_sip.c: Registration from '"303" ' failed for '45.143.220.230:5255' - Wrong password
[2020-03-21 17:10:46] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-21T17:10:46.661-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="303",SessionID="0x7fd82c4f46f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.14
...
2020-03-22 05:26:03
24.19.231.116 attackspambots
no
2020-03-22 05:35:53
89.215.227.155 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-03-22 05:55:59
202.72.243.198 attack
Mar 21 22:10:43 vpn01 sshd[19564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.243.198
Mar 21 22:10:45 vpn01 sshd[19564]: Failed password for invalid user louis from 202.72.243.198 port 55694 ssh2
...
2020-03-22 05:27:28
167.71.128.144 attack
Mar 21 22:18:15 h1745522 sshd[6271]: Invalid user msagent from 167.71.128.144 port 49760
Mar 21 22:18:15 h1745522 sshd[6271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.128.144
Mar 21 22:18:15 h1745522 sshd[6271]: Invalid user msagent from 167.71.128.144 port 49760
Mar 21 22:18:16 h1745522 sshd[6271]: Failed password for invalid user msagent from 167.71.128.144 port 49760 ssh2
Mar 21 22:23:29 h1745522 sshd[6513]: Invalid user annlis from 167.71.128.144 port 40996
Mar 21 22:23:29 h1745522 sshd[6513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.128.144
Mar 21 22:23:29 h1745522 sshd[6513]: Invalid user annlis from 167.71.128.144 port 40996
Mar 21 22:23:31 h1745522 sshd[6513]: Failed password for invalid user annlis from 167.71.128.144 port 40996 ssh2
Mar 21 22:27:00 h1745522 sshd[6744]: Invalid user huanglu from 167.71.128.144 port 58534
...
2020-03-22 05:27:46

Recently Reported IPs

104.20.89.82 104.20.9.218 104.20.9.37 104.21.67.115
104.20.90.113 104.20.9.63 104.20.90.24 104.20.91.115
104.20.90.5 104.20.91.117 104.20.91.49 104.20.91.237
104.21.67.117 104.20.90.21 104.20.91.24 104.20.90.49
104.20.91.37 104.20.91.5 104.20.92.115 104.20.92.150