Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.56.204.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.56.204.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:06:43 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 2.204.56.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.204.56.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.14.137.182 attackspam
Firewall Dropped Connection
2020-06-02 01:57:24
157.245.194.35 attackspambots
fail2ban/Jun  1 19:03:20 h1962932 sshd[32671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.194.35  user=root
Jun  1 19:03:22 h1962932 sshd[32671]: Failed password for root from 157.245.194.35 port 53438 ssh2
Jun  1 19:06:49 h1962932 sshd[552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.194.35  user=root
Jun  1 19:06:51 h1962932 sshd[552]: Failed password for root from 157.245.194.35 port 51594 ssh2
Jun  1 19:10:19 h1962932 sshd[643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.194.35  user=root
Jun  1 19:10:22 h1962932 sshd[643]: Failed password for root from 157.245.194.35 port 49752 ssh2
2020-06-02 01:59:36
122.51.217.125 attackspam
2020-06-01T15:04:23.805640ollin.zadara.org sshd[9250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.217.125  user=root
2020-06-01T15:04:26.206116ollin.zadara.org sshd[9250]: Failed password for root from 122.51.217.125 port 45854 ssh2
...
2020-06-02 02:05:00
62.234.20.135 attack
Jun  1 13:55:02 inter-technics sshd[11163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.20.135  user=root
Jun  1 13:55:04 inter-technics sshd[11163]: Failed password for root from 62.234.20.135 port 46798 ssh2
Jun  1 13:59:42 inter-technics sshd[11409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.20.135  user=root
Jun  1 13:59:44 inter-technics sshd[11409]: Failed password for root from 62.234.20.135 port 43166 ssh2
Jun  1 14:04:15 inter-technics sshd[11685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.20.135  user=root
Jun  1 14:04:17 inter-technics sshd[11685]: Failed password for root from 62.234.20.135 port 39532 ssh2
...
2020-06-02 02:13:14
171.103.56.218 attackspambots
Dovecot Invalid User Login Attempt.
2020-06-02 02:04:38
93.183.131.53 attackbotsspam
SSH_attack
2020-06-02 02:15:06
176.88.222.83 attackspam
Unauthorized connection attempt from IP address 176.88.222.83 on Port 445(SMB)
2020-06-02 01:43:35
200.48.76.132 attack
Port probing on unauthorized port 445
2020-06-02 02:06:34
175.6.136.13 attackbots
Jun  1 19:57:04 santamaria sshd\[10745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.136.13  user=root
Jun  1 19:57:06 santamaria sshd\[10745\]: Failed password for root from 175.6.136.13 port 59088 ssh2
Jun  1 19:58:44 santamaria sshd\[10770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.136.13  user=root
...
2020-06-02 02:06:03
122.51.197.3 attackspambots
frenzy
2020-06-02 01:41:46
194.26.29.53 attack
Scanned 96 unique addresses for 603 unique ports in 24 hours
2020-06-02 02:04:18
137.74.195.183 attackspam
ENG,WP GET /news/wp-includes/wlwmanifest.xml
2020-06-02 01:54:14
182.66.18.197 attackspambots
1591013096 - 06/01/2020 14:04:56 Host: 182.66.18.197/182.66.18.197 Port: 445 TCP Blocked
2020-06-02 01:38:53
92.245.170.17 attackspam
Jun  1 11:29:15 ns sshd[8540]: Connection from 92.245.170.17 port 50274 on 134.119.39.98 port 22
Jun  1 11:29:15 ns sshd[8540]: User r.r from 92.245.170.17 not allowed because not listed in AllowUsers
Jun  1 11:29:15 ns sshd[8540]: Failed password for invalid user r.r from 92.245.170.17 port 50274 ssh2
Jun  1 11:29:15 ns sshd[8540]: Received disconnect from 92.245.170.17 port 50274:11: Bye Bye [preauth]
Jun  1 11:29:15 ns sshd[8540]: Disconnected from 92.245.170.17 port 50274 [preauth]
Jun  1 11:37:28 ns sshd[13410]: Connection from 92.245.170.17 port 55430 on 134.119.39.98 port 22
Jun  1 11:37:30 ns sshd[13410]: User r.r from 92.245.170.17 not allowed because not listed in AllowUsers
Jun  1 11:37:30 ns sshd[13410]: Failed password for invalid user r.r from 92.245.170.17 port 55430 ssh2
Jun  1 11:37:30 ns sshd[13410]: Received disconnect from 92.245.170.17 port 55430:11: Bye Bye [preauth]
Jun  1 11:37:30 ns sshd[13410]: Disconnected from 92.245.170.17 port 55430 [preaut........
-------------------------------
2020-06-02 01:59:13
163.172.19.244 attack
CMS (WordPress or Joomla) login attempt.
2020-06-02 02:12:22

Recently Reported IPs

78.35.109.93 230.157.10.8 122.207.232.18 238.11.150.219
169.159.245.193 212.187.212.5 108.145.236.239 106.201.167.185
224.123.72.53 220.192.119.203 76.243.24.52 187.179.190.117
82.213.219.247 188.120.46.234 238.189.10.84 51.131.154.154
253.165.100.6 199.98.218.216 130.124.10.93 166.210.147.74