Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Raleigh

Region: North Carolina

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.56.54.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.56.54.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 14:56:13 CST 2025
;; MSG SIZE  rcvd: 105
Host info
80.54.56.136.in-addr.arpa domain name pointer 136-56-54-80.googlefiber.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.54.56.136.in-addr.arpa	name = 136-56-54-80.googlefiber.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.175.121.76 attackspam
Oct 19 08:14:26 xtremcommunity sshd\[680558\]: Invalid user git1 from 61.175.121.76 port 43703
Oct 19 08:14:26 xtremcommunity sshd\[680558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.121.76
Oct 19 08:14:28 xtremcommunity sshd\[680558\]: Failed password for invalid user git1 from 61.175.121.76 port 43703 ssh2
Oct 19 08:20:09 xtremcommunity sshd\[680638\]: Invalid user ortega from 61.175.121.76 port 61705
Oct 19 08:20:09 xtremcommunity sshd\[680638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.121.76
...
2019-10-20 02:37:07
51.83.46.178 attackspam
Invalid user hn from 51.83.46.178 port 44162
2019-10-20 02:11:11
156.212.43.28 attackspam
Invalid user admin from 156.212.43.28 port 49299
2019-10-20 02:24:10
222.76.48.73 attackbots
dovecot jail - smtp auth [ma]
2019-10-20 02:44:47
40.73.7.218 attack
Invalid user dc from 40.73.7.218 port 38858
2019-10-20 02:13:09
52.176.110.203 attackbots
Failed password for invalid user on ssh2
2019-10-20 02:38:56
218.92.0.184 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
Failed password for root from 218.92.0.184 port 44987 ssh2
2019-10-20 02:46:26
222.232.29.235 attack
Oct 19 07:55:13 php1 sshd\[16528\]: Invalid user test from 222.232.29.235
Oct 19 07:55:13 php1 sshd\[16528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.232.29.235
Oct 19 07:55:15 php1 sshd\[16528\]: Failed password for invalid user test from 222.232.29.235 port 41744 ssh2
Oct 19 07:59:35 php1 sshd\[16912\]: Invalid user daicy from 222.232.29.235
Oct 19 07:59:35 php1 sshd\[16912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.232.29.235
2019-10-20 02:15:22
51.254.204.190 attackbotsspam
Oct 19 08:02:32 php1 sshd\[17321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.ip-51-254-204.eu  user=root
Oct 19 08:02:34 php1 sshd\[17321\]: Failed password for root from 51.254.204.190 port 53472 ssh2
Oct 19 08:06:13 php1 sshd\[17825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.ip-51-254-204.eu  user=root
Oct 19 08:06:15 php1 sshd\[17825\]: Failed password for root from 51.254.204.190 port 36608 ssh2
Oct 19 08:10:01 php1 sshd\[18656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.ip-51-254-204.eu  user=root
2019-10-20 02:10:45
202.137.155.203 attack
Invalid user system from 202.137.155.203 port 48554
2019-10-20 02:46:39
192.144.148.163 attackbotsspam
Invalid user factorio from 192.144.148.163 port 51620
2019-10-20 02:19:51
59.72.122.148 attackbotsspam
Invalid user zanghongrun from 59.72.122.148 port 46076
2019-10-20 02:38:03
207.180.239.212 attackbots
SSH Brute-Force reported by Fail2Ban
2019-10-20 02:18:19
178.62.6.225 attack
Oct 19 13:55:41 mail sshd\[26085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.6.225  user=root
...
2019-10-20 02:21:38
210.209.72.243 attack
Automatic report - Banned IP Access
2019-10-20 02:17:50

Recently Reported IPs

238.126.8.84 167.33.16.214 80.145.31.38 162.115.10.246
51.169.99.161 160.227.199.99 130.171.159.237 72.140.48.217
141.184.32.211 219.142.71.221 196.68.126.129 213.38.175.186
219.214.107.216 64.169.140.5 2.194.118.103 215.250.4.49
234.249.142.136 191.82.150.24 188.105.195.160 127.3.254.174