Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.104.207.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.104.207.200.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 23:51:34 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 200.207.104.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.207.104.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.122.89 attack
odoo8
...
2020-05-31 18:41:30
181.189.144.206 attackspam
(sshd) Failed SSH login from 181.189.144.206 (GT/Guatemala/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 31 11:21:42 ubnt-55d23 sshd[4117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.189.144.206  user=root
May 31 11:21:44 ubnt-55d23 sshd[4117]: Failed password for root from 181.189.144.206 port 46996 ssh2
2020-05-31 18:20:22
94.138.208.158 attackspambots
May 31 06:43:03 piServer sshd[26620]: Failed password for root from 94.138.208.158 port 39264 ssh2
May 31 06:45:48 piServer sshd[26893]: Failed password for root from 94.138.208.158 port 55684 ssh2
...
2020-05-31 18:41:17
150.136.220.58 attackbotsspam
$f2bV_matches
2020-05-31 18:34:21
119.29.158.26 attackspambots
Invalid user admin from 119.29.158.26 port 50088
2020-05-31 18:37:55
103.93.16.105 attack
[ssh] SSH attack
2020-05-31 18:31:00
41.230.118.58 attackbotsspam
 TCP (SYN) 41.230.118.58:13030 -> port 23, len 44
2020-05-31 18:29:09
183.157.169.94 attackspambots
port 23
2020-05-31 18:54:06
37.49.225.166 attackbotsspam
Fail2Ban Auto Report - VPN Hacking Attempt
2020-05-31 18:45:07
222.90.74.62 attackbotsspam
Invalid user nt from 222.90.74.62 port 43024
2020-05-31 18:56:10
31.129.173.162 attackspambots
May 31 08:34:57 *** sshd[13789]: Invalid user ben from 31.129.173.162
2020-05-31 18:23:20
37.55.98.54 attack
May 31 05:47:11 debian-2gb-nbg1-2 kernel: \[13155609.265380\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.55.98.54 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=62054 DF PROTO=TCP SPT=24830 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0
2020-05-31 18:51:11
134.175.178.118 attackbots
May 31 11:29:17 sip sshd[13016]: Failed password for root from 134.175.178.118 port 49582 ssh2
May 31 11:34:31 sip sshd[14927]: Failed password for root from 134.175.178.118 port 48262 ssh2
May 31 11:37:38 sip sshd[16058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.178.118
2020-05-31 18:47:00
124.239.149.193 attack
SSH brute-force attempt
2020-05-31 18:31:17
112.198.115.60 attackbotsspam
It is slowing my internet
2020-05-31 18:46:01

Recently Reported IPs

180.249.42.238 92.129.39.42 32.180.206.34 60.120.13.26
101.140.108.120 39.150.94.183 200.242.146.231 181.70.19.169
141.243.34.75 41.122.101.189 160.0.147.208 20.24.160.151
247.46.193.89 246.222.14.53 47.166.109.153 185.216.184.44
179.124.79.166 22.186.11.83 196.94.109.190 208.229.90.26