Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       20.33.0.0 - 20.128.255.255
CIDR:           20.64.0.0/10, 20.48.0.0/12, 20.34.0.0/15, 20.36.0.0/14, 20.40.0.0/13, 20.33.0.0/16, 20.128.0.0/16
NetName:        MSFT
NetHandle:      NET-20-33-0-0-1
Parent:         NET20 (NET-20-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Microsoft Corporation (MSFT)
RegDate:        2017-10-18
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/20.33.0.0



OrgName:        Microsoft Corporation
OrgId:          MSFT
Address:        One Microsoft Way
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        1998-07-10
Updated:        2025-06-10
Comment:        To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment:        * https://cert.microsoft.com.  
Comment:        
Comment:        For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment:        * abuse@microsoft.com.  
Comment:        
Comment:        To report security vulnerabilities in Microsoft products and services, please contact:
Comment:        * secure@microsoft.com.  
Comment:        
Comment:        For legal and law enforcement-related requests, please contact:
Comment:        * msndcc@microsoft.com
Comment:        
Comment:        For routing, peering or DNS issues, please 
Comment:        contact:
Comment:        * IOC@microsoft.com
Ref:            https://rdap.arin.net/registry/entity/MSFT


OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName:   Chaturmohta, Somesh 
OrgRoutingPhone:  +1-425-882-8080 
OrgRoutingEmail:  someshch@microsoft.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CHATU3-ARIN

OrgTechHandle: BEDAR6-ARIN
OrgTechName:   Bedard, Dawn 
OrgTechPhone:  +1-425-538-6637 
OrgTechEmail:  dabedard@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BEDAR6-ARIN

OrgTechHandle: IPHOS5-ARIN
OrgTechName:   IPHostmaster, IPHostmaster 
OrgTechPhone:  +1-425-538-6637 
OrgTechEmail:  iphostmaster@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPHOS5-ARIN

OrgTechHandle: SINGH683-ARIN
OrgTechName:   Singh, Prachi 
OrgTechPhone:  +1-425-707-5601 
OrgTechEmail:  pracsin@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SINGH683-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName:   Microsoft Abuse Contact
OrgAbusePhone:  +1-425-882-8080 
OrgAbuseEmail:  abuse@microsoft.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MAC74-ARIN

OrgTechHandle: MRPD-ARIN
OrgTechName:   Microsoft Routing, Peering, and DNS
OrgTechPhone:  +1-425-882-8080 
OrgTechEmail:  IOC@microsoft.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MRPD-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.65.192.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.65.192.101.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100100 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 02 02:00:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
101.192.65.20.in-addr.arpa domain name pointer azpdss3q5pwx.stretchoid.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
101.192.65.20.in-addr.arpa	name = azpdss3q5pwx.stretchoid.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.210.128.37 attackspam
(sshd) Failed SSH login from 41.210.128.37 (UG/Uganda/h25.n1.ips.mtn.co.ug): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 11:43:44 srv sshd[13395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.210.128.37  user=root
Apr  3 11:43:46 srv sshd[13395]: Failed password for root from 41.210.128.37 port 33053 ssh2
Apr  3 11:50:25 srv sshd[13546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.210.128.37  user=root
Apr  3 11:50:27 srv sshd[13546]: Failed password for root from 41.210.128.37 port 37456 ssh2
Apr  3 11:54:48 srv sshd[13691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.210.128.37  user=root
2020-04-03 17:27:19
176.32.34.174 attack
60001/tcp 60001/tcp 11211/udp
[2020-03-29/04-03]3pkt
2020-04-03 17:10:50
118.89.25.35 attackspam
B: Abusive ssh attack
2020-04-03 17:13:34
51.68.189.69 attack
Apr  3 07:15:24 sshgateway sshd\[5008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.ip-51-68-189.eu  user=root
Apr  3 07:15:27 sshgateway sshd\[5008\]: Failed password for root from 51.68.189.69 port 36715 ssh2
Apr  3 07:22:32 sshgateway sshd\[5036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.ip-51-68-189.eu  user=root
2020-04-03 17:48:57
42.114.151.134 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 03-04-2020 04:50:11.
2020-04-03 17:17:59
180.66.207.67 attackbotsspam
SSH bruteforce
2020-04-03 16:59:17
123.18.140.119 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 03-04-2020 04:50:10.
2020-04-03 17:19:53
209.145.90.205 attackbotsspam
firewall-block, port(s): 445/tcp
2020-04-03 17:05:21
51.91.212.80 attackbotsspam
Apr  3 10:58:45 debian-2gb-nbg1-2 kernel: \[8163365.482661\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.91.212.80 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=40632 DPT=444 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-03 17:30:38
103.210.32.104 attackbots
$f2bV_matches
2020-04-03 16:59:58
182.254.154.89 attackspambots
k+ssh-bruteforce
2020-04-03 17:23:22
51.83.33.156 attackspambots
Apr  3 10:22:28 server sshd\[15596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.ip-51-83-33.eu  user=root
Apr  3 10:22:29 server sshd\[15596\]: Failed password for root from 51.83.33.156 port 47388 ssh2
Apr  3 10:35:14 server sshd\[18798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.ip-51-83-33.eu  user=root
Apr  3 10:35:17 server sshd\[18798\]: Failed password for root from 51.83.33.156 port 60554 ssh2
Apr  3 10:42:10 server sshd\[20224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.ip-51-83-33.eu  user=root
...
2020-04-03 17:48:21
162.243.130.252 attack
firewall-block, port(s): 8880/tcp
2020-04-03 17:14:43
77.247.181.162 attackbots
Invalid user test from 77.247.181.162 port 51720
2020-04-03 17:08:12
37.220.36.76 attackspambots
(smtpauth) Failed SMTP AUTH login from 37.220.36.76 (NL/Netherlands/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-03 08:20:28 login authenticator failed for (ADMIN) [37.220.36.76]: 535 Incorrect authentication data (set_id=a.m.bekhradi@srooyesh.com)
2020-04-03 17:00:20

Recently Reported IPs

104.131.46.76 44.243.226.224 60.233.9.165 111.172.5.241
152.32.189.121 35.203.210.77 185.149.24.123 20.65.226.8
20.80.88.167 91.231.89.241 91.231.89.139 91.196.152.1
212.50.252.27 195.178.110.218 124.165.77.119 101.91.148.219
35.215.103.29 139.99.35.34 135.181.43.127 20.55.2.194