Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.125.69.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.125.69.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 14:32:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 56.69.125.128.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.69.125.128.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.180.152.207 attack
2020-10-01T20:53:55.523518mail.thespaminator.com sshd[24503]: Invalid user isa from 139.180.152.207 port 55082
2020-10-01T20:53:56.811402mail.thespaminator.com sshd[24503]: Failed password for invalid user isa from 139.180.152.207 port 55082 ssh2
...
2020-10-02 13:17:19
139.59.83.179 attackspam
Invalid user low from 139.59.83.179 port 54060
2020-10-02 13:28:29
157.245.163.0 attackbotsspam
Oct  2 00:16:31 firewall sshd[18828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.163.0
Oct  2 00:16:31 firewall sshd[18828]: Invalid user tom from 157.245.163.0
Oct  2 00:16:34 firewall sshd[18828]: Failed password for invalid user tom from 157.245.163.0 port 35322 ssh2
...
2020-10-02 13:16:41
88.214.26.13 attackspam
10 attempts against mh_ha-misc-ban on oak
2020-10-02 13:36:41
117.50.20.76 attackspambots
Invalid user private from 117.50.20.76 port 37572
2020-10-02 13:23:49
162.243.128.133 attackbotsspam
 TCP (SYN) 162.243.128.133:36930 -> port 118, len 44
2020-10-02 13:01:07
171.34.78.119 attackbots
$f2bV_matches
2020-10-02 13:40:21
46.105.31.249 attackspam
Invalid user apache2 from 46.105.31.249 port 45928
2020-10-02 13:18:36
165.227.114.134 attackbotsspam
$f2bV_matches
2020-10-02 13:34:48
58.33.84.251 attackbotsspam
Invalid user samba1 from 58.33.84.251 port 61653
2020-10-02 13:11:15
103.154.234.244 attackbots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-02 13:34:35
115.53.7.11 attack
1601584837 - 10/02/2020 03:40:37 Host: hn.kd.ny.adsl/115.53.7.11 Port: 23 TCP Blocked
...
2020-10-02 13:31:49
185.200.118.43 attack
Found on   Alienvault    / proto=6  .  srcport=33272  .  dstport=3128  .     (3846)
2020-10-02 13:03:22
106.75.231.227 attackspambots
Oct  1 05:33:10 m3 sshd[13461]: Invalid user db from 106.75.231.227
Oct  1 05:33:11 m3 sshd[13461]: Failed password for invalid user db from 106.75.231.227 port 57632 ssh2
Oct  1 05:45:48 m3 sshd[14865]: Invalid user demo from 106.75.231.227


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.75.231.227
2020-10-02 13:42:24
124.70.66.245 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-02 13:17:39

Recently Reported IPs

167.73.229.129 115.13.165.79 244.6.227.173 70.117.7.90
45.13.239.146 151.253.73.25 32.29.132.28 210.5.58.93
14.72.236.40 99.141.199.64 190.41.114.140 97.223.153.197
109.247.154.109 90.248.138.174 147.111.24.240 217.68.78.36
189.139.14.9 127.145.116.27 133.33.57.21 164.173.147.244