Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.205.220.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.205.220.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 355 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 00:23:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 104.220.205.56.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 56.205.220.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
96.239.59.131 attack
FTP Brute-Force reported by Fail2Ban
2019-12-05 02:00:43
60.250.164.169 attackbots
Dec  4 14:25:57 * sshd[10557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.164.169
Dec  4 14:25:59 * sshd[10557]: Failed password for invalid user abc123 from 60.250.164.169 port 38522 ssh2
2019-12-05 01:55:03
195.211.173.76 attack
Unauthorized connection attempt from IP address 195.211.173.76 on Port 445(SMB)
2019-12-05 01:52:57
189.179.175.209 attack
Unauthorized connection attempt from IP address 189.179.175.209 on Port 445(SMB)
2019-12-05 02:10:22
218.92.0.155 attack
Dec  4 14:59:03 firewall sshd[18217]: Failed password for root from 218.92.0.155 port 50112 ssh2
Dec  4 14:59:03 firewall sshd[18217]: error: maximum authentication attempts exceeded for root from 218.92.0.155 port 50112 ssh2 [preauth]
Dec  4 14:59:03 firewall sshd[18217]: Disconnecting: Too many authentication failures [preauth]
...
2019-12-05 02:03:59
120.52.121.86 attackbotsspam
Dec  4 20:19:52 server sshd\[17525\]: Invalid user luminita from 120.52.121.86
Dec  4 20:19:52 server sshd\[17525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.121.86 
Dec  4 20:19:53 server sshd\[17525\]: Failed password for invalid user luminita from 120.52.121.86 port 58430 ssh2
Dec  4 20:39:46 server sshd\[23920\]: Invalid user ssh from 120.52.121.86
Dec  4 20:39:46 server sshd\[23920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.121.86 
...
2019-12-05 02:12:02
27.128.234.169 attackspam
Dec  4 19:09:51 MK-Soft-Root2 sshd[8949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.234.169 
Dec  4 19:09:53 MK-Soft-Root2 sshd[8949]: Failed password for invalid user wwwrun from 27.128.234.169 port 53178 ssh2
...
2019-12-05 02:21:13
218.92.0.171 attack
Dec  4 18:06:30 ip-172-31-62-245 sshd\[27793\]: Failed password for root from 218.92.0.171 port 16213 ssh2\
Dec  4 18:06:34 ip-172-31-62-245 sshd\[27793\]: Failed password for root from 218.92.0.171 port 16213 ssh2\
Dec  4 18:06:37 ip-172-31-62-245 sshd\[27793\]: Failed password for root from 218.92.0.171 port 16213 ssh2\
Dec  4 18:06:40 ip-172-31-62-245 sshd\[27793\]: Failed password for root from 218.92.0.171 port 16213 ssh2\
Dec  4 18:06:43 ip-172-31-62-245 sshd\[27793\]: Failed password for root from 218.92.0.171 port 16213 ssh2\
2019-12-05 02:14:21
114.239.177.104 attackspambots
Netgear DGN Device Remote Command Execution Vulnerability
2019-12-05 02:03:35
176.123.9.218 attackbots
firewall-block, port(s): 1880/tcp
2019-12-05 02:07:49
202.107.238.94 attackbotsspam
Dec  4 18:35:19 minden010 sshd[10168]: Failed password for uucp from 202.107.238.94 port 50863 ssh2
Dec  4 18:41:37 minden010 sshd[13742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.107.238.94
Dec  4 18:41:39 minden010 sshd[13742]: Failed password for invalid user kaleem from 202.107.238.94 port 51770 ssh2
...
2019-12-05 01:49:41
14.170.143.242 attackspambots
Unauthorized connection attempt from IP address 14.170.143.242 on Port 445(SMB)
2019-12-05 02:12:20
69.229.6.32 attackspambots
F2B jail: sshd. Time: 2019-12-04 18:57:56, Reported by: VKReport
2019-12-05 02:01:31
92.118.37.99 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 86 - port: 34017 proto: TCP cat: Misc Attack
2019-12-05 01:52:23
46.242.61.54 attack
Unauthorized connection attempt from IP address 46.242.61.54 on Port 445(SMB)
2019-12-05 02:01:04

Recently Reported IPs

106.4.112.215 75.67.26.94 5.23.144.203 186.117.235.148
55.86.249.33 48.80.94.145 218.170.233.6 42.55.23.22
249.29.243.14 177.184.9.58 110.28.165.97 9.72.126.101
31.238.153.123 226.56.180.220 89.100.1.189 241.53.130.243
244.137.142.64 15.65.148.122 200.71.96.184 5.64.128.195