Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.164.207.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.164.207.215.		IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 04:55:01 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 215.207.164.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.207.164.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.29.211.17 attackspam
Sep 15 00:28:50 h2022099 sshd[15137]: reveeclipse mapping checking getaddrinfo for 17-211-29-181.fibertel.com.ar [181.29.211.17] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 15 00:28:50 h2022099 sshd[15137]: Invalid user users from 181.29.211.17
Sep 15 00:28:50 h2022099 sshd[15137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.29.211.17 
Sep 15 00:28:52 h2022099 sshd[15137]: Failed password for invalid user users from 181.29.211.17 port 32789 ssh2
Sep 15 00:28:52 h2022099 sshd[15137]: Received disconnect from 181.29.211.17: 11: Bye Bye [preauth]
Sep 15 00:36:49 h2022099 sshd[16477]: reveeclipse mapping checking getaddrinfo for 17-211-29-181.fibertel.com.ar [181.29.211.17] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 15 00:36:49 h2022099 sshd[16477]: Invalid user wilsonchan from 181.29.211.17
Sep 15 00:36:49 h2022099 sshd[16477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.29.211.17 
Sep........
-------------------------------
2019-09-15 17:15:38
62.216.233.132 attack
2019-09-15T08:25:17.869354abusebot-3.cloudsearch.cf sshd\[15505\]: Invalid user pkjain from 62.216.233.132 port 43900
2019-09-15 16:38:04
157.230.168.4 attackspam
Sep 14 18:18:22 lcdev sshd\[22923\]: Invalid user ts3 from 157.230.168.4
Sep 14 18:18:22 lcdev sshd\[22923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.168.4
Sep 14 18:18:25 lcdev sshd\[22923\]: Failed password for invalid user ts3 from 157.230.168.4 port 38916 ssh2
Sep 14 18:22:50 lcdev sshd\[23331\]: Invalid user ts3bot from 157.230.168.4
Sep 14 18:22:50 lcdev sshd\[23331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.168.4
2019-09-15 17:05:07
132.145.170.174 attackspambots
Sep 14 20:00:33 hanapaa sshd\[10571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174  user=root
Sep 14 20:00:35 hanapaa sshd\[10571\]: Failed password for root from 132.145.170.174 port 28985 ssh2
Sep 14 20:04:37 hanapaa sshd\[10892\]: Invalid user anastacia from 132.145.170.174
Sep 14 20:04:37 hanapaa sshd\[10892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174
Sep 14 20:04:39 hanapaa sshd\[10892\]: Failed password for invalid user anastacia from 132.145.170.174 port 13942 ssh2
2019-09-15 17:16:05
177.53.237.108 attackbots
Sep 15 11:01:35 saschabauer sshd[12940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.53.237.108
Sep 15 11:01:36 saschabauer sshd[12940]: Failed password for invalid user admin from 177.53.237.108 port 58018 ssh2
2019-09-15 17:18:32
164.132.74.78 attackspam
Reported by AbuseIPDB proxy server.
2019-09-15 17:15:14
194.224.53.9 attackspam
Invalid user test from 194.224.53.9 port 40974
2019-09-15 17:17:52
149.56.252.117 attack
Sep 15 11:56:59 server sshd\[22094\]: Invalid user blake from 149.56.252.117 port 42542
Sep 15 11:56:59 server sshd\[22094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.252.117
Sep 15 11:57:01 server sshd\[22094\]: Failed password for invalid user blake from 149.56.252.117 port 42542 ssh2
Sep 15 12:00:47 server sshd\[7814\]: User root from 149.56.252.117 not allowed because listed in DenyUsers
Sep 15 12:00:47 server sshd\[7814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.252.117  user=root
2019-09-15 17:07:27
81.22.45.242 attackbotsspam
09/15/2019-04:27:57.085969 81.22.45.242 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-15 17:08:26
178.217.43.12 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-15 00:52:32,306 INFO [amun_request_handler] PortScan Detected on Port: 445 (178.217.43.12)
2019-09-15 17:14:34
40.73.59.55 attackbots
Sep 15 08:32:14 hcbbdb sshd\[31440\]: Invalid user du from 40.73.59.55
Sep 15 08:32:14 hcbbdb sshd\[31440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.59.55
Sep 15 08:32:16 hcbbdb sshd\[31440\]: Failed password for invalid user du from 40.73.59.55 port 34564 ssh2
Sep 15 08:37:32 hcbbdb sshd\[32000\]: Invalid user john from 40.73.59.55
Sep 15 08:37:32 hcbbdb sshd\[32000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.59.55
2019-09-15 16:49:28
192.99.17.189 attack
Sep 15 05:35:42 ns37 sshd[13493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.17.189
2019-09-15 16:35:22
207.154.229.50 attackspambots
Sep 15 10:26:49 vmanager6029 sshd\[7517\]: Invalid user tk from 207.154.229.50 port 46526
Sep 15 10:26:49 vmanager6029 sshd\[7517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
Sep 15 10:26:51 vmanager6029 sshd\[7517\]: Failed password for invalid user tk from 207.154.229.50 port 46526 ssh2
2019-09-15 17:27:36
221.140.151.235 attack
web-1 [ssh_2] SSH Attack
2019-09-15 17:26:44
217.65.89.62 attack
[portscan] Port scan
2019-09-15 16:45:39

Recently Reported IPs

104.164.207.214 104.164.207.216 104.164.207.217 104.164.207.218
104.164.207.220 104.164.207.221 76.43.59.13 104.164.207.222
112.137.100.149 104.164.207.3 104.164.207.4 104.164.207.5
104.164.207.6 104.164.207.7 104.164.207.8 104.164.207.86
109.13.167.139 35.36.113.136 104.164.207.87 104.164.207.9