Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.227.132.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.227.132.220.		IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:01:12 CST 2022
;; MSG SIZE  rcvd: 108
Host info
220.132.227.104.in-addr.arpa domain name pointer bypassdragon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.132.227.104.in-addr.arpa	name = bypassdragon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.243.140.16 attackspambots
7777/tcp 7474/tcp 2235/tcp...
[2020-04-29/05-27]24pkt,21pt.(tcp),1pt.(udp)
2020-05-28 17:06:11
220.76.205.35 attackspambots
May 28 11:01:22 piServer sshd[6856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.35 
May 28 11:01:24 piServer sshd[6856]: Failed password for invalid user virus from 220.76.205.35 port 48221 ssh2
May 28 11:04:13 piServer sshd[7169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.35 
...
2020-05-28 17:25:52
103.242.200.38 attackspam
SSH login attempts.
2020-05-28 16:47:42
198.211.126.138 attackbotsspam
2020-05-28T08:08:17.739017randservbullet-proofcloud-66.localdomain sshd[21033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.126.138  user=root
2020-05-28T08:08:20.198808randservbullet-proofcloud-66.localdomain sshd[21033]: Failed password for root from 198.211.126.138 port 33760 ssh2
2020-05-28T08:21:24.738107randservbullet-proofcloud-66.localdomain sshd[21086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.126.138  user=ftp
2020-05-28T08:21:26.906691randservbullet-proofcloud-66.localdomain sshd[21086]: Failed password for ftp from 198.211.126.138 port 33872 ssh2
...
2020-05-28 17:23:41
167.114.252.133 attackspambots
Invalid user admin123 from 167.114.252.133 port 41788
2020-05-28 17:01:33
52.15.124.196 attackbotsspam
Invalid user smb from 52.15.124.196 port 51114
2020-05-28 17:22:58
58.210.190.30 attackspambots
Invalid user m1 from 58.210.190.30 port 58676
2020-05-28 17:07:12
94.180.58.238 attack
Invalid user lsfadmin from 94.180.58.238 port 57784
2020-05-28 17:24:28
171.254.10.202 attackbotsspam
Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn.
2020-05-28 17:12:53
107.180.120.64 attack
Automatic report - XMLRPC Attack
2020-05-28 16:59:58
49.88.112.72 attackspam
May 28 11:43:53 pkdns2 sshd\[48483\]: Failed password for root from 49.88.112.72 port 12616 ssh2May 28 11:45:35 pkdns2 sshd\[48590\]: Failed password for root from 49.88.112.72 port 27753 ssh2May 28 11:51:26 pkdns2 sshd\[48841\]: Failed password for root from 49.88.112.72 port 35818 ssh2May 28 11:51:28 pkdns2 sshd\[48841\]: Failed password for root from 49.88.112.72 port 35818 ssh2May 28 11:51:30 pkdns2 sshd\[48841\]: Failed password for root from 49.88.112.72 port 35818 ssh2May 28 11:52:15 pkdns2 sshd\[48873\]: Failed password for root from 49.88.112.72 port 61209 ssh2
...
2020-05-28 17:11:25
167.99.87.82 attack
Invalid user ydk from 167.99.87.82 port 46622
2020-05-28 16:58:47
157.245.124.160 attackbotsspam
Invalid user darren from 157.245.124.160 port 54788
2020-05-28 17:17:01
178.128.232.77 attackbotsspam
SSH login attempts.
2020-05-28 17:26:15
157.230.230.152 attackspam
May 28 08:42:42 l02a sshd[24945]: Invalid user 11111 from 157.230.230.152
May 28 08:42:42 l02a sshd[24945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.230.152 
May 28 08:42:42 l02a sshd[24945]: Invalid user 11111 from 157.230.230.152
May 28 08:42:44 l02a sshd[24945]: Failed password for invalid user 11111 from 157.230.230.152 port 50078 ssh2
2020-05-28 16:52:22

Recently Reported IPs

104.227.132.210 104.227.132.226 104.227.132.224 105.213.103.218
104.227.132.234 104.227.132.228 104.227.132.236 104.227.132.240
104.227.132.238 104.227.132.243 104.227.132.252 104.227.132.251
104.227.132.248 105.213.103.219 104.227.133.101 104.227.132.254
104.227.133.112 104.227.133.118 104.227.132.246 104.227.133.121