Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.64.97.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51237
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.64.97.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025113001 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 01 05:30:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
136.97.64.20.in-addr.arpa domain name pointer azpdssya3d1q.stretchoid.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.97.64.20.in-addr.arpa	name = azpdssya3d1q.stretchoid.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.93.70.125 attackbotsspam
Lines containing failures of 61.93.70.125
Aug  5 02:33:37 mellenthin sshd[19918]: User r.r from 61.93.70.125 not allowed because not listed in AllowUsers
Aug  5 02:33:37 mellenthin sshd[19918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.70.125  user=r.r
Aug  5 02:33:39 mellenthin sshd[19918]: Failed password for invalid user r.r from 61.93.70.125 port 50010 ssh2
Aug  5 02:33:39 mellenthin sshd[19918]: Received disconnect from 61.93.70.125 port 50010:11: Bye Bye [preauth]
Aug  5 02:33:39 mellenthin sshd[19918]: Disconnected from invalid user r.r 61.93.70.125 port 50010 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.93.70.125
2020-08-05 13:28:31
88.99.11.11 attack
2020-08-05 13:57:03
187.73.21.180 attackspambots
$f2bV_matches
2020-08-05 13:21:41
170.150.55.50 attackbots
Aug  5 04:57:53 mail.srvfarm.net postfix/smtpd[1857047]: warning: unknown[170.150.55.50]: SASL PLAIN authentication failed: 
Aug  5 04:57:53 mail.srvfarm.net postfix/smtpd[1857047]: lost connection after AUTH from unknown[170.150.55.50]
Aug  5 05:06:02 mail.srvfarm.net postfix/smtpd[1857050]: warning: unknown[170.150.55.50]: SASL PLAIN authentication failed: 
Aug  5 05:06:02 mail.srvfarm.net postfix/smtpd[1857050]: lost connection after AUTH from unknown[170.150.55.50]
Aug  5 05:07:46 mail.srvfarm.net postfix/smtpd[1872481]: warning: unknown[170.150.55.50]: SASL PLAIN authentication failed:
2020-08-05 14:02:27
165.227.26.69 attack
Aug  5 07:08:36 buvik sshd[25043]: Failed password for root from 165.227.26.69 port 42760 ssh2
Aug  5 07:12:25 buvik sshd[25698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69  user=root
Aug  5 07:12:27 buvik sshd[25698]: Failed password for root from 165.227.26.69 port 53246 ssh2
...
2020-08-05 13:15:15
194.170.156.9 attackbots
2020-08-05T05:11:40.439898shield sshd\[24608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9  user=root
2020-08-05T05:11:41.963817shield sshd\[24608\]: Failed password for root from 194.170.156.9 port 57969 ssh2
2020-08-05T05:15:24.372437shield sshd\[25781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9  user=root
2020-08-05T05:15:26.318423shield sshd\[25781\]: Failed password for root from 194.170.156.9 port 57207 ssh2
2020-08-05T05:19:05.559846shield sshd\[26295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9  user=root
2020-08-05 13:50:49
177.154.239.214 attackbotsspam
Aug  5 05:47:23 mail.srvfarm.net postfix/smtpd[1876490]: warning: unknown[177.154.239.214]: SASL PLAIN authentication failed: 
Aug  5 05:47:23 mail.srvfarm.net postfix/smtpd[1876490]: lost connection after AUTH from unknown[177.154.239.214]
Aug  5 05:51:10 mail.srvfarm.net postfix/smtpd[1877844]: warning: unknown[177.154.239.214]: SASL PLAIN authentication failed: 
Aug  5 05:51:11 mail.srvfarm.net postfix/smtpd[1877844]: lost connection after AUTH from unknown[177.154.239.214]
Aug  5 05:52:42 mail.srvfarm.net postfix/smtpd[1878872]: warning: unknown[177.154.239.214]: SASL PLAIN authentication failed:
2020-08-05 13:58:02
51.144.83.227 attackbots
URL Probing: /xmlrpc.php
2020-08-05 13:19:12
61.177.124.118 attackspam
Aug  5 00:50:29 our-server-hostname sshd[23145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.124.118  user=r.r
Aug  5 00:50:31 our-server-hostname sshd[23145]: Failed password for r.r from 61.177.124.118 port 2140 ssh2
Aug  5 01:06:51 our-server-hostname sshd[26890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.124.118  user=r.r
Aug  5 01:06:54 our-server-hostname sshd[26890]: Failed password for r.r from 61.177.124.118 port 2141 ssh2
Aug  5 01:11:03 our-server-hostname sshd[27845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.124.118  user=r.r
Aug  5 01:11:04 our-server-hostname sshd[27845]: Failed password for r.r from 61.177.124.118 port 2142 ssh2
Aug  5 01:14:54 our-server-hostname sshd[28812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.124.118  user=r.r
Aug  5 01:14........
-------------------------------
2020-08-05 13:22:35
128.199.225.104 attackbots
*Port Scan* detected from 128.199.225.104 (SG/Singapore/-/Singapore (Pioneer)/-). 4 hits in the last 120 seconds
2020-08-05 13:42:29
218.255.226.218 attackspambots
Tried our host z.
2020-08-05 13:15:59
46.101.164.33 attackspam
Lines containing failures of 46.101.164.33
Aug  5 00:30:57 nemesis sshd[16948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.164.33  user=r.r
Aug  5 00:30:59 nemesis sshd[16948]: Failed password for r.r from 46.101.164.33 port 50172 ssh2
Aug  5 00:31:00 nemesis sshd[16948]: Received disconnect from 46.101.164.33 port 50172:11: Bye Bye [preauth]
Aug  5 00:31:00 nemesis sshd[16948]: Disconnected from authenticating user r.r 46.101.164.33 port 50172 [preauth]
Aug  5 00:42:25 nemesis sshd[21514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.164.33  user=r.r
Aug  5 00:42:27 nemesis sshd[21514]: Failed password for r.r from 46.101.164.33 port 40700 ssh2
Aug  5 00:42:27 nemesis sshd[21514]: Received disconnect from 46.101.164.33 port 40700:11: Bye Bye [preauth]
Aug  5 00:42:27 nemesis sshd[21514]: Disconnected from authenticating user r.r 46.101.164.33 port 40700 [preauth]
Aug  5........
------------------------------
2020-08-05 13:14:27
128.199.223.233 attackspam
*Port Scan* detected from 128.199.223.233 (SG/Singapore/-/Singapore (Pioneer)/-). 4 hits in the last 265 seconds
2020-08-05 13:43:46
222.186.175.216 attackbotsspam
Brute-force attempt banned
2020-08-05 13:45:58
129.211.173.127 attack
Aug  5 06:56:27 vpn01 sshd[5476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.173.127
Aug  5 06:56:29 vpn01 sshd[5476]: Failed password for invalid user 123Asd456 from 129.211.173.127 port 33018 ssh2
...
2020-08-05 13:49:22

Recently Reported IPs

66.249.75.196 41.238.47.175 14.103.111.172 58.55.24.200
42.236.203.120 39.152.80.155 221.221.207.40 221.0.66.188
183.93.225.209 121.32.68.163 117.176.187.21 113.228.79.59
111.227.30.152 106.8.187.196 83.130.143.198 156.212.59.62
37.41.8.84 10.86.164.233 47.79.41.201 138.197.135.217