Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
204.12.215.162 attackspam
Unauthorised access (Sep  1) SRC=204.12.215.162 LEN=40 TTL=241 ID=51459 TCP DPT=445 WINDOW=1024 SYN
2019-09-01 06:17:28
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       204.12.192.0 - 204.12.255.255
CIDR:           204.12.192.0/18
NetName:        WII-NET-204-12
NetHandle:      NET-204-12-192-0-1
Parent:         NET204 (NET-204-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   WholeSale Internet, Inc. (WHOLE-125)
RegDate:        2009-06-08
Updated:        2018-04-10
Comment:        http://www.wholesaleinternet.net
Ref:            https://rdap.arin.net/registry/ip/204.12.192.0


OrgName:        WholeSale Internet, Inc.
OrgId:          WHOLE-125
Address:        201 East 16th Ave
City:           North Kansas City
StateProv:      MO
PostalCode:     64116
Country:        US
RegDate:        2003-09-24
Updated:        2023-10-27
Comment:        http://www.wholesaleinternet.net
Ref:            https://rdap.arin.net/registry/entity/WHOLE-125


OrgAbuseHandle: NETWO1111-ARIN
OrgAbuseName:   Network Security
OrgAbusePhone:  +1-816-256-3031 
OrgAbuseEmail:  abuse@nocix.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO1111-ARIN

OrgTechHandle: REGIO-ARIN
OrgTechName:   Region, Bob 
OrgTechPhone:  +1-816-256-3031 
OrgTechEmail:  bob@wholesaleinternet.net
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIO-ARIN

OrgTechHandle: AWE13-ARIN
OrgTechName:   Wendel, Aaron 
OrgTechPhone:  +1-816-256-3031 
OrgTechEmail:  aaron@nocix.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWE13-ARIN

OrgTechHandle: KAISE102-ARIN
OrgTechName:   kaiser, rebecca 
OrgTechPhone:  +1-816-256-3031 
OrgTechEmail:  rebecca@nocix.net
OrgTechRef:    https://rdap.arin.net/registry/entity/KAISE102-ARIN

OrgTechHandle: KRH22-ARIN
OrgTechName:   HODLE, Kevin Robert
OrgTechPhone:  +1-816-256-3031 
OrgTechEmail:  kevin@wholesaleinternet.net
OrgTechRef:    https://rdap.arin.net/registry/entity/KRH22-ARIN

RAbuseHandle: NETWO1111-ARIN
RAbuseName:   Network Security
RAbusePhone:  +1-816-256-3031 
RAbuseEmail:  abuse@nocix.net
RAbuseRef:    https://rdap.arin.net/registry/entity/NETWO1111-ARIN

RNOCHandle: NETWO1112-ARIN
RNOCName:   Network Operations
RNOCPhone:  +1-816-256-3031 
RNOCEmail:  admin@wholesaleinternet.net
RNOCRef:    https://rdap.arin.net/registry/entity/NETWO1112-ARIN

RTechHandle: NETWO1112-ARIN
RTechName:   Network Operations
RTechPhone:  +1-816-256-3031 
RTechEmail:  admin@wholesaleinternet.net
RTechRef:    https://rdap.arin.net/registry/entity/NETWO1112-ARIN

# end


# start

NetRange:       204.12.215.48 - 204.12.215.55
CIDR:           204.12.215.48/29
NetName:        DS-204-12-215-49-55
NetHandle:      NET-204-12-215-48-1
Parent:         WII-NET-204-12 (NET-204-12-192-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       liu, ha (C08499583)
RegDate:        2022-06-03
Updated:        2022-06-03
Ref:            https://rdap.arin.net/registry/ip/204.12.215.48


CustName:       liu, ha
Address:        201 E. 16th st
City:           North Kansas City
StateProv:      MO
PostalCode:     64116
Country:        US
RegDate:        2022-06-03
Updated:        2022-06-03
Ref:            https://rdap.arin.net/registry/entity/C08499583

OrgAbuseHandle: NETWO1111-ARIN
OrgAbuseName:   Network Security
OrgAbusePhone:  +1-816-256-3031 
OrgAbuseEmail:  abuse@nocix.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO1111-ARIN

OrgTechHandle: REGIO-ARIN
OrgTechName:   Region, Bob 
OrgTechPhone:  +1-816-256-3031 
OrgTechEmail:  bob@wholesaleinternet.net
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIO-ARIN

OrgTechHandle: AWE13-ARIN
OrgTechName:   Wendel, Aaron 
OrgTechPhone:  +1-816-256-3031 
OrgTechEmail:  aaron@nocix.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWE13-ARIN

OrgTechHandle: KAISE102-ARIN
OrgTechName:   kaiser, rebecca 
OrgTechPhone:  +1-816-256-3031 
OrgTechEmail:  rebecca@nocix.net
OrgTechRef:    https://rdap.arin.net/registry/entity/KAISE102-ARIN

OrgTechHandle: KRH22-ARIN
OrgTechName:   HODLE, Kevin Robert
OrgTechPhone:  +1-816-256-3031 
OrgTechEmail:  kevin@wholesaleinternet.net
OrgTechRef:    https://rdap.arin.net/registry/entity/KRH22-ARIN

RAbuseHandle: NETWO1111-ARIN
RAbuseName:   Network Security
RAbusePhone:  +1-816-256-3031 
RAbuseEmail:  abuse@nocix.net
RAbuseRef:    https://rdap.arin.net/registry/entity/NETWO1111-ARIN

RNOCHandle: NETWO1112-ARIN
RNOCName:   Network Operations
RNOCPhone:  +1-816-256-3031 
RNOCEmail:  admin@wholesaleinternet.net
RNOCRef:    https://rdap.arin.net/registry/entity/NETWO1112-ARIN

RTechHandle: NETWO1112-ARIN
RTechName:   Network Operations
RTechPhone:  +1-816-256-3031 
RTechEmail:  admin@wholesaleinternet.net
RTechRef:    https://rdap.arin.net/registry/entity/NETWO1112-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.12.215.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.12.215.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012500 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 26 00:30:03 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 54.215.12.204.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.215.12.204.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.143.38.232 attack
Sep 13 20:58:08 IngegnereFirenze sshd[6305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.143.38.232  user=root
...
2020-09-14 06:35:23
51.210.44.157 attack
Sep 14 00:42:58 OPSO sshd\[25739\]: Invalid user zhengtao from 51.210.44.157 port 42850
Sep 14 00:42:58 OPSO sshd\[25739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.44.157
Sep 14 00:42:59 OPSO sshd\[25739\]: Failed password for invalid user zhengtao from 51.210.44.157 port 42850 ssh2
Sep 14 00:49:20 OPSO sshd\[26606\]: Invalid user zhengtao from 51.210.44.157 port 48452
Sep 14 00:49:20 OPSO sshd\[26606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.44.157
2020-09-14 06:49:29
82.64.15.100 attackspambots
Automatic report - Banned IP Access
2020-09-14 06:30:20
117.50.8.2 attackspambots
Sep 12 05:22:21 efa1 sshd[12427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.8.2  user=r.r
Sep 12 05:22:23 efa1 sshd[12427]: Failed password for r.r from 117.50.8.2 port 34238 ssh2
Sep 12 05:28:33 efa1 sshd[14564]: Invalid user mailman from 117.50.8.2
Sep 12 05:28:33 efa1 sshd[14564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.8.2 
Sep 12 05:28:35 efa1 sshd[14564]: Failed password for invalid user mailman from 117.50.8.2 port 44784 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.50.8.2
2020-09-14 07:00:05
132.232.2.100 attack
2020-09-13T21:39:40.078796abusebot-2.cloudsearch.cf sshd[30669]: Invalid user FIELD from 132.232.2.100 port 34524
2020-09-13T21:39:40.085073abusebot-2.cloudsearch.cf sshd[30669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.2.100
2020-09-13T21:39:40.078796abusebot-2.cloudsearch.cf sshd[30669]: Invalid user FIELD from 132.232.2.100 port 34524
2020-09-13T21:39:42.448898abusebot-2.cloudsearch.cf sshd[30669]: Failed password for invalid user FIELD from 132.232.2.100 port 34524 ssh2
2020-09-13T21:43:13.104475abusebot-2.cloudsearch.cf sshd[30724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.2.100  user=root
2020-09-13T21:43:14.710530abusebot-2.cloudsearch.cf sshd[30724]: Failed password for root from 132.232.2.100 port 44140 ssh2
2020-09-13T21:46:33.838907abusebot-2.cloudsearch.cf sshd[30734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.2.
...
2020-09-14 06:35:49
181.67.226.226 attackbots
Automatic report - Port Scan Attack
2020-09-14 06:45:28
91.214.114.7 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-09-14 06:50:33
180.76.136.193 attackbotsspam
Sep 13 20:17:28 root sshd[10895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.136.193  user=root
Sep 13 20:17:31 root sshd[10895]: Failed password for root from 180.76.136.193 port 15940 ssh2
...
2020-09-14 06:57:41
94.180.247.20 attackbots
Sep 13 21:47:33 ip106 sshd[11550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.247.20 
Sep 13 21:47:36 ip106 sshd[11550]: Failed password for invalid user paraccel from 94.180.247.20 port 40364 ssh2
...
2020-09-14 06:41:10
85.192.33.63 attackbotsspam
$f2bV_matches
2020-09-14 06:58:21
18.236.219.113 attack
18.236.219.113 - - [13/Sep/2020:21:57:57 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
18.236.219.113 - - [13/Sep/2020:21:58:20 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
18.236.219.113 - - [13/Sep/2020:21:58:31 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-14 07:04:20
157.230.2.208 attack
Sep 13 22:45:19 rancher-0 sshd[30067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208  user=root
Sep 13 22:45:21 rancher-0 sshd[30067]: Failed password for root from 157.230.2.208 port 58920 ssh2
...
2020-09-14 06:59:17
46.217.136.57 attackbotsspam
1600016174 - 09/13/2020 18:56:14 Host: 46.217.136.57/46.217.136.57 Port: 445 TCP Blocked
2020-09-14 06:59:37
59.50.80.11 attackspambots
Sep 14 00:03:32 router sshd[20081]: Failed password for root from 59.50.80.11 port 41364 ssh2
Sep 14 00:03:35 router sshd[20081]: Failed password for root from 59.50.80.11 port 41364 ssh2
Sep 14 00:03:39 router sshd[20081]: Failed password for root from 59.50.80.11 port 41364 ssh2
Sep 14 00:03:42 router sshd[20081]: Failed password for root from 59.50.80.11 port 41364 ssh2
...
2020-09-14 06:58:54
5.35.252.223 attack
Email Spam, Phishing by camouflaged links, ultimate aim to install Ransomware
2020-09-14 06:42:48

Recently Reported IPs

152.32.178.47 20.65.194.43 162.243.60.61 195.248.78.210
93.66.87.98 93.66.85.158 109.118.83.242 203.172.63.76
74.222.3.79 74.222.3.163 74.222.3.154 223.244.8.41
172.208.24.40 150.255.109.232 77.83.39.69 39.108.149.232
223.104.42.140 111.201.247.66 54.224.229.32 162.216.149.66