Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.64.105.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.64.105.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 19 00:00:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
194.105.64.20.in-addr.arpa domain name pointer azpdsgens699.stretchoid.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.105.64.20.in-addr.arpa	name = azpdsgens699.stretchoid.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.39.67.154 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-10 17:43:12
222.232.29.235 attackspam
Automatic report - Banned IP Access
2019-08-10 18:10:38
1.54.200.202 attack
Unauthorized connection attempt from IP address 1.54.200.202 on Port 445(SMB)
2019-08-10 17:53:06
187.120.133.248 attackbots
failed_logins
2019-08-10 18:32:27
185.175.93.104 attackspambots
firewall-block, port(s): 3377/tcp, 23391/tcp, 33393/tcp
2019-08-10 18:42:28
125.212.178.27 attackspam
Unauthorized connection attempt from IP address 125.212.178.27 on Port 445(SMB)
2019-08-10 17:35:09
162.243.94.34 attack
Aug 10 06:14:21 xtremcommunity sshd\[5165\]: Invalid user babi from 162.243.94.34 port 44972
Aug 10 06:14:21 xtremcommunity sshd\[5165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.94.34
Aug 10 06:14:23 xtremcommunity sshd\[5165\]: Failed password for invalid user babi from 162.243.94.34 port 44972 ssh2
Aug 10 06:21:58 xtremcommunity sshd\[5415\]: Invalid user lai from 162.243.94.34 port 39775
Aug 10 06:21:58 xtremcommunity sshd\[5415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.94.34
...
2019-08-10 18:39:36
77.87.77.12 attackspam
08/09/2019-22:29:33.345249 77.87.77.12 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-10 18:05:39
213.32.67.160 attackbots
Automatic report - Banned IP Access
2019-08-10 17:41:34
220.132.36.160 attackspambots
2019-08-10T05:12:24.875930abusebot-6.cloudsearch.cf sshd\[775\]: Invalid user gp from 220.132.36.160 port 59102
2019-08-10 18:21:10
92.118.161.5 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-08-10 18:12:26
59.83.214.10 attackspam
2019-08-10T02:28:33.216838abusebot-5.cloudsearch.cf sshd\[19299\]: Invalid user samba from 59.83.214.10 port 36094
2019-08-10 18:19:13
83.97.20.151 attackbotsspam
" "
2019-08-10 17:48:36
51.68.94.61 attack
Automatic report - Banned IP Access
2019-08-10 18:23:43
35.185.63.59 attackbots
port scan and connect, tcp 23 (telnet)
2019-08-10 18:20:47

Recently Reported IPs

41.98.80.78 41.111.219.217 42.236.17.239 218.33.108.144
175.136.213.213 182.116.28.121 115.127.75.219 115.207.135.116
182.44.9.147 93.22.38.132 171.40.32.81 20.163.15.124
185.216.140.186 113.131.169.198 59.106.27.182 49.212.235.24
45.61.186.39 116.204.15.59 162.216.149.219 193.198.158.130