Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.64.96.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43783
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.64.96.205.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025070300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 03 14:31:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
205.96.64.20.in-addr.arpa domain name pointer azpdssmmbpn3.stretchoid.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
205.96.64.20.in-addr.arpa	name = azpdssmmbpn3.stretchoid.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.118.104.237 attackspam
Nov 13 09:54:50 minden010 sshd[22805]: Failed password for root from 125.118.104.237 port 13624 ssh2
Nov 13 09:58:34 minden010 sshd[24106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.118.104.237
Nov 13 09:58:37 minden010 sshd[24106]: Failed password for invalid user squid from 125.118.104.237 port 47046 ssh2
...
2019-11-13 17:04:17
66.96.229.7 attackbotsspam
Automatic report - Banned IP Access
2019-11-13 17:34:51
106.13.26.40 attackbots
Nov 13 09:21:53 vtv3 sshd\[3961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.26.40  user=root
Nov 13 09:21:55 vtv3 sshd\[3961\]: Failed password for root from 106.13.26.40 port 47813 ssh2
Nov 13 09:26:09 vtv3 sshd\[6240\]: Invalid user woodruff from 106.13.26.40 port 19046
Nov 13 09:26:09 vtv3 sshd\[6240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.26.40
Nov 13 09:26:11 vtv3 sshd\[6240\]: Failed password for invalid user woodruff from 106.13.26.40 port 19046 ssh2
Nov 13 09:37:23 vtv3 sshd\[11967\]: Invalid user zaydan from 106.13.26.40 port 51921
Nov 13 09:37:23 vtv3 sshd\[11967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.26.40
Nov 13 09:37:25 vtv3 sshd\[11967\]: Failed password for invalid user zaydan from 106.13.26.40 port 51921 ssh2
Nov 13 09:41:21 vtv3 sshd\[13974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty
2019-11-13 17:30:15
185.103.110.209 attack
WEB SPAM: Find No String Girls Near Online for Sex Tonight (528 beautiful women want sex in your city right now): https://sexy-girls-jk.blogspot.mx?z=36
2019-11-13 17:12:42
182.180.50.165 attack
Automatic report - Port Scan Attack
2019-11-13 17:31:24
201.212.88.17 attackspambots
11/13/2019-01:26:01.495832 201.212.88.17 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-13 17:34:15
159.203.141.208 attackbotsspam
2019-11-13T09:10:25.329234shield sshd\[32678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.141.208  user=root
2019-11-13T09:10:27.516341shield sshd\[32678\]: Failed password for root from 159.203.141.208 port 33448 ssh2
2019-11-13T09:13:55.753130shield sshd\[422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.141.208  user=root
2019-11-13T09:13:57.769588shield sshd\[422\]: Failed password for root from 159.203.141.208 port 40114 ssh2
2019-11-13T09:19:51.382590shield sshd\[837\]: Invalid user wymore from 159.203.141.208 port 46784
2019-11-13 17:28:31
202.29.176.21 attackbotsspam
Nov 12 21:11:02 tdfoods sshd\[31109\]: Invalid user nuc9ntp40 from 202.29.176.21
Nov 12 21:11:02 tdfoods sshd\[31109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.176.21
Nov 12 21:11:05 tdfoods sshd\[31109\]: Failed password for invalid user nuc9ntp40 from 202.29.176.21 port 7267 ssh2
Nov 12 21:15:10 tdfoods sshd\[31461\]: Invalid user swsgest from 202.29.176.21
Nov 12 21:15:10 tdfoods sshd\[31461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.176.21
2019-11-13 17:09:11
210.126.1.36 attackbots
Invalid user admin from 210.126.1.36 port 35372
2019-11-13 17:23:55
185.200.118.77 attack
185.200.118.77 was recorded 5 times by 5 hosts attempting to connect to the following ports: 1080. Incident counter (4h, 24h, all-time): 5, 5, 28
2019-11-13 17:14:18
125.212.207.205 attack
Nov 13 08:59:39 localhost sshd\[75037\]: Invalid user spagon from 125.212.207.205 port 57272
Nov 13 08:59:39 localhost sshd\[75037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.207.205
Nov 13 08:59:41 localhost sshd\[75037\]: Failed password for invalid user spagon from 125.212.207.205 port 57272 ssh2
Nov 13 09:04:21 localhost sshd\[75124\]: Invalid user payson from 125.212.207.205 port 37780
Nov 13 09:04:21 localhost sshd\[75124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.207.205
...
2019-11-13 17:23:03
109.134.73.82 attack
$f2bV_matches
2019-11-13 17:03:19
103.74.120.201 attackbotsspam
WordPress XMLRPC scan :: 103.74.120.201 0.132 BYPASS [13/Nov/2019:06:26:46  0000] [censored_4] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-13 17:10:00
144.168.201.190 attackbots
WordPress XMLRPC scan :: 144.168.201.190 0.168 - [13/Nov/2019:06:26:35  0000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 194 "https://www.[censored_1]/" "PHP/6.3.49" "HTTP/1.1"
2019-11-13 17:15:24
45.80.65.83 attack
2019-11-13T01:15:57.3648771495-001 sshd\[35677\]: Failed password for invalid user nfs from 45.80.65.83 port 37028 ssh2
2019-11-13T02:17:36.9296991495-001 sshd\[37762\]: Invalid user smardon from 45.80.65.83 port 58904
2019-11-13T02:17:36.9328041495-001 sshd\[37762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.83
2019-11-13T02:17:39.5219831495-001 sshd\[37762\]: Failed password for invalid user smardon from 45.80.65.83 port 58904 ssh2
2019-11-13T02:21:41.8327871495-001 sshd\[37897\]: Invalid user niko from 45.80.65.83 port 39096
2019-11-13T02:21:41.8390491495-001 sshd\[37897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.83
...
2019-11-13 17:16:44

Recently Reported IPs

47.237.136.202 117.219.45.43 35.232.179.193 97.206.43.99
127.126.179.110 35.249.16.198 7.88.82.152 172.30.203.39
13.77.61.244 219.15.32.103 238.7.43.81 64.81.34.137
47.237.93.196 47.237.121.34 8.219.162.252 47.237.134.146
47.121.190.233 43.130.26.3 192.168.1.92 192.168.1.192