Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.80.164.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.80.164.42.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 00:52:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.164.80.204.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.164.80.204.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.215.244.12 attack
<6 unauthorized SSH connections
2019-12-07 17:47:46
86.125.35.209 attack
Port Scan
2019-12-07 17:57:44
107.174.217.122 attackbots
Dec  7 09:01:07 localhost sshd\[106844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.217.122  user=root
Dec  7 09:01:09 localhost sshd\[106844\]: Failed password for root from 107.174.217.122 port 39330 ssh2
Dec  7 09:06:54 localhost sshd\[106998\]: Invalid user marilou from 107.174.217.122 port 43439
Dec  7 09:06:54 localhost sshd\[106998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.217.122
Dec  7 09:06:55 localhost sshd\[106998\]: Failed password for invalid user marilou from 107.174.217.122 port 43439 ssh2
...
2019-12-07 17:26:49
148.70.24.20 attackspam
Dec  7 11:26:48 sauna sshd[195112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.24.20
Dec  7 11:26:51 sauna sshd[195112]: Failed password for invalid user partap from 148.70.24.20 port 41144 ssh2
...
2019-12-07 17:32:27
134.209.64.10 attackbots
Dec  7 09:19:53 game-panel sshd[7800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10
Dec  7 09:19:55 game-panel sshd[7800]: Failed password for invalid user amans from 134.209.64.10 port 53634 ssh2
Dec  7 09:25:30 game-panel sshd[8052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10
2019-12-07 17:38:58
103.248.85.244 attackbots
Unauthorized connection attempt from IP address 103.248.85.244
2019-12-07 18:00:24
70.132.63.86 attackspambots
Automatic report generated by Wazuh
2019-12-07 17:24:56
106.241.16.119 attackbotsspam
Dec  7 07:54:22 vpn01 sshd[21424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.16.119
Dec  7 07:54:25 vpn01 sshd[21424]: Failed password for invalid user 0987654321 from 106.241.16.119 port 37152 ssh2
...
2019-12-07 17:55:41
163.172.176.138 attackspambots
2019-12-07T07:24:37.160846host3.slimhost.com.ua sshd[2686497]: Invalid user skanes from 163.172.176.138 port 36308
2019-12-07T07:24:37.168893host3.slimhost.com.ua sshd[2686497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.176.138
2019-12-07T07:24:37.160846host3.slimhost.com.ua sshd[2686497]: Invalid user skanes from 163.172.176.138 port 36308
2019-12-07T07:24:38.500771host3.slimhost.com.ua sshd[2686497]: Failed password for invalid user skanes from 163.172.176.138 port 36308 ssh2
2019-12-07T07:33:48.569552host3.slimhost.com.ua sshd[2690056]: Invalid user ornest from 163.172.176.138 port 44820
2019-12-07T07:33:48.578431host3.slimhost.com.ua sshd[2690056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.176.138
2019-12-07T07:33:48.569552host3.slimhost.com.ua sshd[2690056]: Invalid user ornest from 163.172.176.138 port 44820
2019-12-07T07:33:50.550737host3.slimhost.com.ua sshd[2690056]: Fai
...
2019-12-07 17:47:23
68.34.15.8 attackspam
Dec  7 04:47:48 TORMINT sshd\[25750\]: Invalid user jorgensen from 68.34.15.8
Dec  7 04:47:48 TORMINT sshd\[25750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.34.15.8
Dec  7 04:47:50 TORMINT sshd\[25750\]: Failed password for invalid user jorgensen from 68.34.15.8 port 44272 ssh2
...
2019-12-07 17:54:01
144.91.113.246 attackbotsspam
Lines containing failures of 144.91.113.246
auth.log:Dec  4 20:13:50 omfg sshd[12160]: Connection from 144.91.113.246 port 40952 on 78.46.60.41 port 22
auth.log:Dec  4 20:13:50 omfg sshd[12160]: Did not receive identification string from 144.91.113.246
auth.log:Dec  4 20:13:50 omfg sshd[12161]: Connection from 144.91.113.246 port 40056 on 78.46.60.53 port 22
auth.log:Dec  4 20:13:50 omfg sshd[12161]: Did not receive identification string from 144.91.113.246
auth.log:Dec  4 20:13:50 omfg sshd[12164]: Connection from 144.91.113.246 port 36410 on 78.46.60.16 port 22
auth.log:Dec  4 20:13:50 omfg sshd[12164]: Did not receive identification string from 144.91.113.246
auth.log:Dec  4 20:13:50 omfg sshd[12162]: Connection from 144.91.113.246 port 58736 on 78.46.60.40 port 22
auth.log:Dec  4 20:13:50 omfg sshd[12162]: Did not receive identification string from 144.91.113.246
auth.log:Dec  4 20:13:50 omfg sshd[12163]: Connection from 144.91.113.246 port 48244 on 78.46.60.42 port ........
------------------------------
2019-12-07 18:04:21
192.99.225.97 attackspam
login attempts
2019-12-07 17:35:03
222.186.180.17 attack
2019-12-07T09:34:54.866405abusebot.cloudsearch.cf sshd\[26338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
2019-12-07 17:37:06
210.14.77.102 attackspambots
Dec  7 08:09:32 localhost sshd\[105360\]: Invalid user hsiao from 210.14.77.102 port 7522
Dec  7 08:09:32 localhost sshd\[105360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.77.102
Dec  7 08:09:34 localhost sshd\[105360\]: Failed password for invalid user hsiao from 210.14.77.102 port 7522 ssh2
Dec  7 08:18:09 localhost sshd\[105646\]: Invalid user test1234 from 210.14.77.102 port 4183
Dec  7 08:18:09 localhost sshd\[105646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.77.102
...
2019-12-07 17:44:36
165.22.103.237 attack
2019-12-07T09:16:39.714277abusebot-4.cloudsearch.cf sshd\[1600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.103.237  user=root
2019-12-07 17:23:33

Recently Reported IPs

204.80.164.48 204.80.164.55 204.80.164.69 204.80.164.87
204.80.164.5 204.80.164.61 204.80.164.88 204.80.164.96
204.80.164.92 204.80.64.4 204.80.64.28 204.84.216.49
204.85.28.50 204.87.189.51 204.86.135.157 204.86.134.233
204.85.199.1 204.86.135.134 204.87.189.92 204.86.116.39