Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Denver

Region: Colorado

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.69.18.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53662
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.69.18.20.			IN	A

;; AUTHORITY SECTION:
.			352	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102301 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 24 03:51:39 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 20.18.69.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.18.69.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
64.233.164.109 attackbotsspam
SSH login attempts.
2020-06-19 19:32:39
51.178.51.36 attack
fail2ban -- 51.178.51.36
...
2020-06-19 19:04:40
185.220.101.194 attackbots
Automatic report - Banned IP Access
2020-06-19 19:25:39
104.26.2.27 attackspambots
SSH login attempts.
2020-06-19 19:32:02
5.196.69.227 attack
Jun 19 08:16:16 odroid64 sshd\[13393\]: Invalid user mg from 5.196.69.227
Jun 19 08:16:16 odroid64 sshd\[13393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.69.227
...
2020-06-19 19:30:47
51.15.191.243 attackbots
SSH login attempts.
2020-06-19 19:08:24
154.92.15.7 attackbotsspam
Fail2Ban Ban Triggered
2020-06-19 19:09:37
111.229.136.177 attackbots
2020-06-19T11:54:23.722283+02:00  sshd[25742]: Failed password for invalid user edgar from 111.229.136.177 port 47756 ssh2
2020-06-19 19:34:03
23.21.153.210 attackbots
SSH login attempts.
2020-06-19 19:16:31
42.236.10.108 attackbotsspam
Automated report (2020-06-19T12:51:44+08:00). Scraper detected at this address.
2020-06-19 19:00:22
14.161.45.187 attackspambots
Jun 19 12:41:20 vps639187 sshd\[26885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187  user=root
Jun 19 12:41:21 vps639187 sshd\[26885\]: Failed password for root from 14.161.45.187 port 60281 ssh2
Jun 19 12:44:41 vps639187 sshd\[26937\]: Invalid user ustin from 14.161.45.187 port 60197
Jun 19 12:44:41 vps639187 sshd\[26937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.187
...
2020-06-19 18:58:42
213.195.224.138 attackbotsspam
(CZ/Czechia/-) SMTP Bruteforcing attempts
2020-06-19 19:20:12
71.246.210.34 attackbots
Invalid user upload from 71.246.210.34 port 34004
2020-06-19 19:07:57
125.64.94.130 attackspam
firewall-block, port(s): 994/tcp
2020-06-19 19:27:37
213.235.158.11 attackspam
(CZ/Czechia/-) SMTP Bruteforcing attempts
2020-06-19 19:09:24

Recently Reported IPs

196.210.228.205 201.116.6.81 1.5.25.20 52.53.38.76
203.98.43.227 82.234.178.44 182.53.201.250 65.184.190.101
216.1.0.127 5.167.205.106 14.1.109.140 160.122.75.218
49.92.23.233 102.81.109.154 217.221.158.139 193.250.116.74
95.227.21.152 70.33.107.244 175.158.239.126 95.244.244.84