Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Redmond

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.49.129.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;20.49.129.104.			IN	A

;; AUTHORITY SECTION:
.			510	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 21:14:30 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 104.129.49.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.129.49.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.210.89.229 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-11 09:39:34
95.242.177.213 attackbots
Sep 10 22:12:04 marvibiene sshd[13634]: Invalid user vbox from 95.242.177.213 port 54658
Sep 10 22:12:04 marvibiene sshd[13634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.242.177.213
Sep 10 22:12:04 marvibiene sshd[13634]: Invalid user vbox from 95.242.177.213 port 54658
Sep 10 22:12:07 marvibiene sshd[13634]: Failed password for invalid user vbox from 95.242.177.213 port 54658 ssh2
...
2019-09-11 09:47:51
60.210.40.210 attack
Sep 10 12:08:17 eddieflores sshd\[11218\]: Invalid user sftpuser from 60.210.40.210
Sep 10 12:08:17 eddieflores sshd\[11218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.210
Sep 10 12:08:19 eddieflores sshd\[11218\]: Failed password for invalid user sftpuser from 60.210.40.210 port 5119 ssh2
Sep 10 12:12:44 eddieflores sshd\[11735\]: Invalid user xxx from 60.210.40.210
Sep 10 12:12:44 eddieflores sshd\[11735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.210
2019-09-11 09:16:51
88.204.242.54 attack
SMB Server BruteForce Attack
2019-09-11 09:49:13
78.188.59.112 attackspam
Automatic report - Port Scan Attack
2019-09-11 09:05:02
27.152.139.83 attackbots
RDP Bruteforce
2019-09-11 09:46:31
179.178.195.118 attackbotsspam
Automatic report - Port Scan Attack
2019-09-11 09:20:37
106.12.178.62 attackspambots
frenzy
2019-09-11 09:43:37
157.245.129.241 attackbotsspam
Sep 10 16:57:16 josie sshd[20442]: Invalid user ubnt from 157.245.129.241
Sep 10 16:57:16 josie sshd[20442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.129.241 
Sep 10 16:57:18 josie sshd[20442]: Failed password for invalid user ubnt from 157.245.129.241 port 49936 ssh2
Sep 10 16:57:18 josie sshd[20444]: Received disconnect from 157.245.129.241: 11: Bye Bye
Sep 10 16:57:18 josie sshd[20480]: Invalid user admin from 157.245.129.241
Sep 10 16:57:18 josie sshd[20480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.129.241 
Sep 10 16:57:21 josie sshd[20480]: Failed password for invalid user admin from 157.245.129.241 port 52136 ssh2
Sep 10 16:57:21 josie sshd[20481]: Received disconnect from 157.245.129.241: 11: Bye Bye
Sep 10 16:57:21 josie sshd[20497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.129.241  user=r.r
Sep 10 ........
-------------------------------
2019-09-11 09:24:15
58.87.97.219 attackbots
Sep 10 22:12:00   TCP Attack: SRC=58.87.97.219 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=50  PROTO=TCP SPT=23223 DPT=23 WINDOW=16815 RES=0x00 SYN URGP=0
2019-09-11 09:41:34
80.211.249.177 attackbotsspam
Sep 11 03:21:35 MK-Soft-Root1 sshd\[2429\]: Invalid user admin from 80.211.249.177 port 39952
Sep 11 03:21:35 MK-Soft-Root1 sshd\[2429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.249.177
Sep 11 03:21:37 MK-Soft-Root1 sshd\[2429\]: Failed password for invalid user admin from 80.211.249.177 port 39952 ssh2
...
2019-09-11 09:31:11
209.97.167.131 attackbots
Sep 11 02:02:36 tux-35-217 sshd\[6709\]: Invalid user testsftp from 209.97.167.131 port 47666
Sep 11 02:02:36 tux-35-217 sshd\[6709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.167.131
Sep 11 02:02:38 tux-35-217 sshd\[6709\]: Failed password for invalid user testsftp from 209.97.167.131 port 47666 ssh2
Sep 11 02:12:27 tux-35-217 sshd\[6780\]: Invalid user 1qaz2wsx from 209.97.167.131 port 40370
Sep 11 02:12:27 tux-35-217 sshd\[6780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.167.131
...
2019-09-11 09:13:35
83.246.93.220 attackbots
Sep 11 04:39:26 taivassalofi sshd[145201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.246.93.220
Sep 11 04:39:29 taivassalofi sshd[145201]: Failed password for invalid user alexk from 83.246.93.220 port 40144 ssh2
...
2019-09-11 09:42:27
145.239.87.109 attack
Sep 11 00:23:48 MK-Soft-VM3 sshd\[14276\]: Invalid user 1q2w3e4r from 145.239.87.109 port 52130
Sep 11 00:23:48 MK-Soft-VM3 sshd\[14276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.87.109
Sep 11 00:23:50 MK-Soft-VM3 sshd\[14276\]: Failed password for invalid user 1q2w3e4r from 145.239.87.109 port 52130 ssh2
...
2019-09-11 09:28:26
218.78.50.252 attackspam
Sep 10 20:02:11 web1 postfix/smtpd[5479]: warning: unknown[218.78.50.252]: SASL LOGIN authentication failed: authentication failure
...
2019-09-11 09:05:26

Recently Reported IPs

141.148.208.211 129.113.26.77 212.207.56.238 164.225.137.204
216.114.178.118 85.211.155.253 90.102.234.169 204.190.62.63
123.151.121.4 192.120.122.176 137.176.184.24 185.97.73.228
139.64.122.20 38.202.24.243 176.249.159.64 157.35.229.200
166.112.139.6 155.180.49.6 86.221.187.194 183.148.153.144