Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.56.148.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44086
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.56.148.56.			IN	A

;; AUTHORITY SECTION:
.			307	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:25:54 CST 2022
;; MSG SIZE  rcvd: 105
Host info
56.148.56.13.in-addr.arpa domain name pointer ec2-13-56-148-56.us-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.148.56.13.in-addr.arpa	name = ec2-13-56-148-56.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.175.113.123 attackbots
" "
2019-12-25 14:17:40
125.215.207.40 attackbotsspam
Invalid user jessica from 125.215.207.40 port 57121
2019-12-25 14:19:32
5.63.119.154 attackspambots
Dec 25 05:30:01 *** sshd[4329]: Invalid user hollenbach from 5.63.119.154
2019-12-25 14:14:30
78.133.163.190 attackspambots
postfix
2019-12-25 13:39:46
211.25.81.250 attackspambots
Automatic report - Banned IP Access
2019-12-25 13:50:27
69.12.92.28 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-25 14:18:48
182.61.27.149 attack
Dec 25 05:57:26 vpn01 sshd[9972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.149
Dec 25 05:57:28 vpn01 sshd[9972]: Failed password for invalid user stupid from 182.61.27.149 port 51826 ssh2
...
2019-12-25 13:38:30
220.127.135.103 attackbots
firewall-block, port(s): 23/tcp
2019-12-25 13:51:47
177.22.123.74 attackspambots
Automatic report - Port Scan Attack
2019-12-25 13:43:26
218.92.0.212 attackbotsspam
Dec 25 00:32:36 TORMINT sshd\[17949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Dec 25 00:32:38 TORMINT sshd\[17949\]: Failed password for root from 218.92.0.212 port 46266 ssh2
Dec 25 00:32:50 TORMINT sshd\[17949\]: Failed password for root from 218.92.0.212 port 46266 ssh2
...
2019-12-25 13:43:52
182.254.136.65 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-25 14:00:20
77.29.112.198 attackspambots
Unauthorized connection attempt detected from IP address 77.29.112.198 to port 445
2019-12-25 14:01:13
175.213.132.56 attack
postfix (unknown user, SPF fail or relay access denied)
2019-12-25 13:51:01
31.179.144.190 attack
Invalid user marybeth from 31.179.144.190 port 39324
2019-12-25 14:02:06
62.234.79.230 attack
Dec 25 06:57:50 MK-Soft-Root1 sshd[7569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.79.230 
Dec 25 06:57:52 MK-Soft-Root1 sshd[7569]: Failed password for invalid user Eeva from 62.234.79.230 port 54586 ssh2
...
2019-12-25 14:06:19

Recently Reported IPs

13.56.148.59 13.56.15.220 13.56.149.223 13.56.173.8
13.56.153.153 13.56.174.50 13.56.189.102 13.56.19.186
13.56.171.150 13.56.198.226 13.56.204.233 13.56.207.224
13.56.201.159 13.56.213.251 130.13.143.233 13.56.244.129
13.56.218.50 13.56.224.22 13.56.30.207 13.56.218.45