Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.56.217.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.56.217.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:51:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
106.217.56.122.in-addr.arpa domain name pointer 122-56-217-106.mobile.spark.co.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.217.56.122.in-addr.arpa	name = 122-56-217-106.mobile.spark.co.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.23.62.187 attackspambots
Invalid user tisha from 94.23.62.187 port 36172
2019-08-24 00:18:27
103.28.219.143 attackspambots
Aug 23 18:18:31 legacy sshd[5877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.143
Aug 23 18:18:33 legacy sshd[5877]: Failed password for invalid user abuse from 103.28.219.143 port 60351 ssh2
Aug 23 18:23:22 legacy sshd[5942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.143
...
2019-08-24 00:26:44
180.183.244.160 attack
Invalid user admin from 180.183.244.160 port 46201
2019-08-23 23:39:39
123.28.243.96 attack
Invalid user admin from 123.28.243.96 port 40322
2019-08-23 23:59:40
138.68.146.186 attack
Aug 23 17:29:53 vps647732 sshd[1650]: Failed password for root from 138.68.146.186 port 54450 ssh2
...
2019-08-23 23:53:43
159.65.97.238 attackspambots
Invalid user foswiki from 159.65.97.238 port 41316
2019-08-23 23:46:42
149.56.43.120 attack
WordPress XMLRPC scan :: 149.56.43.120 0.164 BYPASS [24/Aug/2019:02:23:18  1000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/5.3.48"
2019-08-24 00:30:53
144.217.255.89 attackspambots
Invalid user john from 144.217.255.89 port 56500
2019-08-23 23:51:26
191.7.8.180 attackspam
Invalid user train5 from 191.7.8.180 port 42000
2019-08-23 23:36:32
151.80.217.219 attackspambots
Invalid user icinga from 151.80.217.219 port 53498
2019-08-23 23:49:54
178.62.117.82 attackbots
" "
2019-08-23 23:42:34
159.203.169.16 attackspam
$f2bV_matches
2019-08-23 23:46:10
95.58.194.141 attackspambots
Aug 23 17:40:50 XXX sshd[29165]: Invalid user ofsaa from 95.58.194.141 port 53864
2019-08-24 00:17:30
182.119.154.243 attackspam
Invalid user admin from 182.119.154.243 port 45091
2019-08-23 23:38:26
116.118.122.102 attackbots
Invalid user admin from 116.118.122.102 port 44357
2019-08-24 00:06:02

Recently Reported IPs

133.58.179.125 93.90.7.147 216.187.208.17 70.196.129.162
123.179.248.185 39.125.78.133 242.200.118.248 51.49.115.49
188.150.109.48 175.9.207.129 107.117.132.69 169.80.131.21
152.24.211.99 170.201.70.160 180.80.85.137 208.102.128.109
95.211.152.89 96.114.154.161 144.174.87.24 3.221.128.254