Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.2.240.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42919
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.2.240.56.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:03:39 CST 2024
;; MSG SIZE  rcvd: 104
Host info
Host 56.240.2.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.240.2.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.136.184.75 attackspambots
Aug 4 11:42:04 *hidden* sshd[1722]: Failed password for *hidden* from 61.136.184.75 port 48664 ssh2 Aug 4 11:43:54 *hidden* sshd[1969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.136.184.75 user=root Aug 4 11:43:56 *hidden* sshd[1969]: Failed password for *hidden* from 61.136.184.75 port 58392 ssh2
2020-08-04 20:24:51
222.186.175.148 attack
Aug  4 11:52:26 localhost sshd[117780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Aug  4 11:52:28 localhost sshd[117780]: Failed password for root from 222.186.175.148 port 63300 ssh2
Aug  4 11:52:31 localhost sshd[117780]: Failed password for root from 222.186.175.148 port 63300 ssh2
Aug  4 11:52:26 localhost sshd[117780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Aug  4 11:52:28 localhost sshd[117780]: Failed password for root from 222.186.175.148 port 63300 ssh2
Aug  4 11:52:31 localhost sshd[117780]: Failed password for root from 222.186.175.148 port 63300 ssh2
Aug  4 11:52:26 localhost sshd[117780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Aug  4 11:52:28 localhost sshd[117780]: Failed password for root from 222.186.175.148 port 63300 ssh2
Aug  4 11:52:31 localhost
...
2020-08-04 20:02:32
159.89.130.178 attack
leo_www
2020-08-04 20:39:53
106.13.66.103 attackbots
Aug  4 07:51:16 ny01 sshd[14010]: Failed password for root from 106.13.66.103 port 47510 ssh2
Aug  4 07:54:01 ny01 sshd[14339]: Failed password for root from 106.13.66.103 port 50162 ssh2
2020-08-04 20:19:50
91.121.221.195 attack
SSH Brute Force
2020-08-04 20:13:24
219.118.134.234 attackspam
Aug  4 11:25:06 debian-2gb-nbg1-2 kernel: \[18791572.821038\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=219.118.134.234 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=45 ID=23299 PROTO=TCP SPT=65349 DPT=23 WINDOW=63308 RES=0x00 SYN URGP=0
2020-08-04 20:39:31
51.77.220.183 attackbots
Aug  4 13:54:04 piServer sshd[7140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.183 
Aug  4 13:54:05 piServer sshd[7140]: Failed password for invalid user forever99 from 51.77.220.183 port 46096 ssh2
Aug  4 13:58:33 piServer sshd[7689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.183 
...
2020-08-04 19:59:45
212.170.50.203 attackbotsspam
Aug  4 11:25:25 mail sshd[9725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.170.50.203  user=root
Aug  4 11:25:27 mail sshd[9725]: Failed password for root from 212.170.50.203 port 41388 ssh2
...
2020-08-04 20:21:22
81.7.7.32 attack
*Port Scan* detected from 81.7.7.32 (DE/Germany/Thuringia/Jena/s81-7-7-32.blue.kundencontroller.de). 4 hits in the last 65 seconds
2020-08-04 20:28:16
36.68.99.100 attack
Automatic report - Port Scan Attack
2020-08-04 20:13:57
192.144.204.6 attackbotsspam
Aug  4 09:19:38 ns3033917 sshd[28513]: Failed password for root from 192.144.204.6 port 45188 ssh2
Aug  4 09:25:47 ns3033917 sshd[28542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.204.6  user=root
Aug  4 09:25:50 ns3033917 sshd[28542]: Failed password for root from 192.144.204.6 port 50748 ssh2
...
2020-08-04 20:05:36
200.24.221.226 attackspambots
Aug  4 09:08:37 ws24vmsma01 sshd[224799]: Failed password for root from 200.24.221.226 port 49814 ssh2
...
2020-08-04 20:17:56
35.204.70.38 attackbotsspam
Aug  4 12:27:57 vpn01 sshd[18537]: Failed password for root from 35.204.70.38 port 38354 ssh2
...
2020-08-04 19:58:34
200.73.132.57 attackbotsspam
Lines containing failures of 200.73.132.57
Aug  3 00:05:07 shared05 sshd[18474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.132.57  user=r.r
Aug  3 00:05:09 shared05 sshd[18474]: Failed password for r.r from 200.73.132.57 port 50564 ssh2
Aug  3 00:05:09 shared05 sshd[18474]: Received disconnect from 200.73.132.57 port 50564:11: Bye Bye [preauth]
Aug  3 00:05:09 shared05 sshd[18474]: Disconnected from authenticating user r.r 200.73.132.57 port 50564 [preauth]
Aug  3 00:10:02 shared05 sshd[22422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.132.57  user=r.r
Aug  3 00:10:05 shared05 sshd[22422]: Failed password for r.r from 200.73.132.57 port 40842 ssh2
Aug  3 00:10:05 shared05 sshd[22422]: Received disconnect from 200.73.132.57 port 4
.... truncated .... 
Lines containing failures of 200.73.132.57
Aug  3 00:05:07 shared05 sshd[18474]: pam_unix(sshd:auth): authentication f........
------------------------------
2020-08-04 20:11:13
45.112.149.150 attackspambots
IP 45.112.149.150 attacked honeypot on port: 5000 at 8/4/2020 2:24:51 AM
2020-08-04 20:16:39

Recently Reported IPs

11.20.148.91 11.2.228.239 11.20.146.142 11.200.173.79
11.2.61.70 11.201.164.121 11.201.180.229 11.2.220.53
11.2.158.19 11.200.247.246 11.20.188.26 11.204.180.196
11.202.3.97 11.2.38.41 11.2.174.15 11.2.136.105
11.2.170.117 11.2.85.165 11.2.231.50 11.20.200.61