Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.56.134.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.56.134.150.			IN	A

;; AUTHORITY SECTION:
.			131	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:29:30 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 150.134.56.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.134.56.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
147.78.65.82 attack
Oct 23 15:56:39 cumulus sshd[18956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.78.65.82  user=r.r
Oct 23 15:56:41 cumulus sshd[18956]: Failed password for r.r from 147.78.65.82 port 33142 ssh2
Oct 23 15:56:41 cumulus sshd[18956]: Received disconnect from 147.78.65.82 port 33142:11: Bye Bye [preauth]
Oct 23 15:56:41 cumulus sshd[18956]: Disconnected from 147.78.65.82 port 33142 [preauth]
Oct 23 16:05:53 cumulus sshd[19230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.78.65.82  user=r.r
Oct 23 16:05:55 cumulus sshd[19230]: Failed password for r.r from 147.78.65.82 port 58786 ssh2
Oct 23 16:05:56 cumulus sshd[19230]: Received disconnect from 147.78.65.82 port 58786:11: Bye Bye [preauth]
Oct 23 16:05:56 cumulus sshd[19230]: Disconnected from 147.78.65.82 port 58786 [preauth]
Oct 23 16:12:46 cumulus sshd[19615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ........
-------------------------------
2019-10-24 05:25:10
51.68.122.216 attackspam
Oct 23 22:27:14 OPSO sshd\[14750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.216  user=admin
Oct 23 22:27:16 OPSO sshd\[14750\]: Failed password for admin from 51.68.122.216 port 33358 ssh2
Oct 23 22:31:03 OPSO sshd\[15369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.216  user=root
Oct 23 22:31:05 OPSO sshd\[15369\]: Failed password for root from 51.68.122.216 port 43782 ssh2
Oct 23 22:34:48 OPSO sshd\[15938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.216  user=root
2019-10-24 05:31:33
188.17.88.170 attackbots
Chat Spam
2019-10-24 05:26:58
113.171.23.119 attack
Invalid user oracle from 113.171.23.119 port 58924
2019-10-24 05:37:00
170.0.128.10 attack
SSH bruteforce (Triggered fail2ban)
2019-10-24 05:09:29
35.220.180.126 attack
Oct 23 23:02:30 mail sshd[7752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.220.180.126 
Oct 23 23:02:33 mail sshd[7752]: Failed password for invalid user harishchandra from 35.220.180.126 port 48216 ssh2
Oct 23 23:10:03 mail sshd[11030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.220.180.126
2019-10-24 05:30:11
34.69.119.60 attack
Oct 23 23:53:20 sauna sshd[185446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.119.60
Oct 23 23:53:22 sauna sshd[185446]: Failed password for invalid user www2 from 34.69.119.60 port 42886 ssh2
...
2019-10-24 05:24:35
94.177.250.221 attack
Oct 23 17:01:48 ny01 sshd[18793]: Failed password for root from 94.177.250.221 port 57924 ssh2
Oct 23 17:05:43 ny01 sshd[19133]: Failed password for root from 94.177.250.221 port 39598 ssh2
2019-10-24 05:34:15
122.144.143.213 attack
Oct 23 21:36:29 vtv3 sshd\[26228\]: Invalid user export from 122.144.143.213 port 43800
Oct 23 21:36:29 vtv3 sshd\[26228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.143.213
Oct 23 21:36:30 vtv3 sshd\[26228\]: Failed password for invalid user export from 122.144.143.213 port 43800 ssh2
Oct 23 21:43:17 vtv3 sshd\[29602\]: Invalid user testmail from 122.144.143.213 port 41196
Oct 23 21:43:17 vtv3 sshd\[29602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.143.213
Oct 23 21:59:28 vtv3 sshd\[5432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.143.213  user=root
Oct 23 21:59:29 vtv3 sshd\[5432\]: Failed password for root from 122.144.143.213 port 47034 ssh2
Oct 23 22:04:05 vtv3 sshd\[7978\]: Invalid user test from 122.144.143.213 port 58292
Oct 23 22:04:05 vtv3 sshd\[7978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh
2019-10-24 05:30:54
75.108.166.219 attack
Oct 23 22:13:34 rotator sshd\[27145\]: Invalid user admin from 75.108.166.219Oct 23 22:13:37 rotator sshd\[27145\]: Failed password for invalid user admin from 75.108.166.219 port 44893 ssh2Oct 23 22:15:00 rotator sshd\[27151\]: Invalid user ubuntu from 75.108.166.219Oct 23 22:15:03 rotator sshd\[27151\]: Failed password for invalid user ubuntu from 75.108.166.219 port 44965 ssh2Oct 23 22:16:24 rotator sshd\[27918\]: Invalid user pi from 75.108.166.219Oct 23 22:16:27 rotator sshd\[27918\]: Failed password for invalid user pi from 75.108.166.219 port 45026 ssh2
...
2019-10-24 05:12:13
58.254.132.239 attackbotsspam
Oct 23 22:56:18 vps647732 sshd[10532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.239
Oct 23 22:56:21 vps647732 sshd[10532]: Failed password for invalid user denielyn from 58.254.132.239 port 59852 ssh2
...
2019-10-24 05:08:29
45.40.166.142 attackspambots
WordPress brute force
2019-10-24 05:33:20
106.13.67.127 attackbotsspam
Oct 23 18:12:17 odroid64 sshd\[28819\]: User root from 106.13.67.127 not allowed because not listed in AllowUsers
Oct 23 18:12:17 odroid64 sshd\[28819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.127  user=root
Oct 23 18:12:20 odroid64 sshd\[28819\]: Failed password for invalid user root from 106.13.67.127 port 59374 ssh2
...
2019-10-24 05:26:01
112.175.124.2 attack
10/23/2019-17:26:12.941323 112.175.124.2 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-24 05:27:15
106.243.162.3 attackbots
Oct 22 01:34:30 odroid64 sshd\[16458\]: User root from 106.243.162.3 not allowed because not listed in AllowUsers
Oct 22 01:34:30 odroid64 sshd\[16458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3  user=root
Oct 22 01:34:32 odroid64 sshd\[16458\]: Failed password for invalid user root from 106.243.162.3 port 58197 ssh2
...
2019-10-24 05:16:59

Recently Reported IPs

11.55.58.42 11.54.35.51 11.55.193.124 11.59.146.72
11.59.141.253 11.55.158.206 11.53.3.192 11.54.191.167
11.56.248.87 11.54.79.114 11.54.184.53 11.58.190.33
11.55.201.194 11.53.67.9 11.57.8.78 11.54.152.136
11.53.226.183 11.58.158.194 11.57.105.163 11.54.142.105