Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.20.31.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50420
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.20.31.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 21:22:13 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 56.31.20.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.31.20.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.159.157.154 attack
web-1 [ssh] SSH Attack
2020-10-13 08:55:04
109.125.137.170 attackbotsspam
Invalid user ronaldo from 109.125.137.170 port 54236
2020-10-13 08:56:32
83.97.20.31 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-13 12:11:02
80.82.70.178 attackbots
SmallBizIT.US 1 packets to tcp(22)
2020-10-13 12:11:53
112.85.42.94 attack
Oct 13 02:39:31 piServer sshd[12520]: Failed password for root from 112.85.42.94 port 33324 ssh2
Oct 13 02:39:33 piServer sshd[12520]: Failed password for root from 112.85.42.94 port 33324 ssh2
Oct 13 02:39:37 piServer sshd[12520]: Failed password for root from 112.85.42.94 port 33324 ssh2
...
2020-10-13 08:56:06
5.188.206.200 attackspambots
Oct 12 16:45:02 xzibhostname postfix/smtpd[6692]: connect from unknown[5.188.206.200]
Oct 12 16:45:04 xzibhostname postfix/smtpd[7323]: connect from unknown[5.188.206.200]
Oct 12 16:45:05 xzibhostname postfix/smtpd[8678]: connect from unknown[5.188.206.200]
Oct 12 16:45:05 xzibhostname postfix/smtpd[6692]: warning: unknown[5.188.206.200]: SASL PLAIN authentication failed: authentication failure
Oct 12 16:45:06 xzibhostname postfix/smtpd[6692]: lost connection after AUTH from unknown[5.188.206.200]
Oct 12 16:45:06 xzibhostname postfix/smtpd[6692]: disconnect from unknown[5.188.206.200] ehlo=1 auth=0/1 commands=1/2
Oct 12 16:45:06 xzibhostname postfix/smtpd[6692]: connect from unknown[5.188.206.200]
Oct 12 16:45:09 xzibhostname postfix/smtpd[8678]: warning: unknown[5.188.206.200]: SASL PLAIN authentication failed: authentication failure
Oct 12 16:45:09 xzibhostname postfix/smtpd[7323]: warning: unknown[5.188.206.200]: SASL PLAIN authentication failed: authentication failu........
-------------------------------
2020-10-13 08:51:28
82.98.168.104 attackspambots
Port scan: Attack repeated for 24 hours
2020-10-13 12:11:31
88.214.24.243 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 4136 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 12:10:47
123.100.226.245 attackspam
Oct 13 01:05:58 roki-contabo sshd\[14426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.100.226.245  user=root
Oct 13 01:06:00 roki-contabo sshd\[14426\]: Failed password for root from 123.100.226.245 port 46200 ssh2
Oct 13 01:16:33 roki-contabo sshd\[14573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.100.226.245  user=root
Oct 13 01:16:34 roki-contabo sshd\[14573\]: Failed password for root from 123.100.226.245 port 47336 ssh2
Oct 13 01:20:02 roki-contabo sshd\[14662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.100.226.245  user=root
...
2020-10-13 08:47:31
103.49.243.238 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 100 - port: 23 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 12:06:29
177.220.133.158 attack
$f2bV_matches
2020-10-13 08:58:30
185.221.134.250 attackspam
[Tue Oct 13 05:32:33 2020] IN=enp34s0 OUT= MAC=SERVERMAC SRC=185.221.134.250 DST=MYSERVERIP LEN=433 TOS=0x00 PREC=0x00 TTL=53 ID=56564 DF PROTO=UDP SPT=5068 DPT=5060 LEN=413 Ports: 5060
2020-10-13 12:04:04
92.63.196.23 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-13 12:08:22
12.32.37.130 attackbots
Oct 12 22:40:13 abendstille sshd\[26050\]: Invalid user prashant from 12.32.37.130
Oct 12 22:40:13 abendstille sshd\[26050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.32.37.130
Oct 12 22:40:14 abendstille sshd\[26050\]: Failed password for invalid user prashant from 12.32.37.130 port 28049 ssh2
Oct 12 22:46:17 abendstille sshd\[1334\]: Invalid user fred from 12.32.37.130
Oct 12 22:46:17 abendstille sshd\[1334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.32.37.130
...
2020-10-13 08:51:52
89.248.160.139 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 4089 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 12:09:50

Recently Reported IPs

203.84.91.76 174.95.192.123 123.81.202.255 204.221.113.17
133.135.223.148 15.197.5.231 6.159.48.60 205.171.143.253
178.123.183.55 140.122.161.179 19.67.3.45 241.2.169.123
38.86.245.234 85.215.234.196 20.62.0.63 45.150.241.93
213.21.189.127 23.86.42.238 19.3.226.16 65.154.83.155