Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.113.121.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.113.121.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 13:47:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 56.121.113.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.121.113.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.33.107.190 attack
Port Scan
2019-10-23 20:04:54
137.74.169.241 attackbots
REQUESTED PAGE: /imaspammer/
2019-10-23 20:16:45
77.222.153.233 attackbotsspam
firewall-block, port(s): 9001/tcp
2019-10-23 20:20:13
106.52.34.27 attackbots
Oct 23 13:50:21 dedicated sshd[12255]: Invalid user vweru from 106.52.34.27 port 43534
2019-10-23 20:06:49
193.37.57.229 attackbotsspam
193.37.57.229 has been banned for [spam]
...
2019-10-23 19:55:59
175.194.143.244 attackbots
firewall-block, port(s): 23/tcp
2019-10-23 20:08:41
185.50.129.30 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 20:14:38
185.86.164.108 attack
CMS brute force
...
2019-10-23 19:49:53
71.38.225.45 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-23 20:03:34
111.231.75.83 attackspam
Oct 23 01:48:25 eddieflores sshd\[10954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83  user=root
Oct 23 01:48:27 eddieflores sshd\[10954\]: Failed password for root from 111.231.75.83 port 41934 ssh2
Oct 23 01:53:46 eddieflores sshd\[11398\]: Invalid user 0 from 111.231.75.83
Oct 23 01:53:46 eddieflores sshd\[11398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83
Oct 23 01:53:48 eddieflores sshd\[11398\]: Failed password for invalid user 0 from 111.231.75.83 port 52230 ssh2
2019-10-23 20:05:14
118.121.201.83 attack
$f2bV_matches_ltvn
2019-10-23 20:13:42
222.92.153.90 attack
Helo
2019-10-23 19:55:42
213.251.41.52 attack
$f2bV_matches
2019-10-23 19:59:09
185.53.88.67 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 20:05:37
144.217.161.22 attackspam
144.217.161.22 - - \[23/Oct/2019:11:57:22 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
144.217.161.22 - - \[23/Oct/2019:11:57:23 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-10-23 20:21:37

Recently Reported IPs

199.209.28.226 40.254.109.134 145.203.59.117 9.27.15.140
234.229.155.166 19.48.83.47 30.182.189.4 232.192.239.216
150.16.61.50 49.240.180.131 218.89.245.112 125.72.64.137
8.116.80.42 145.208.151.157 157.177.171.1 94.114.84.68
220.182.5.202 29.11.135.197 121.220.183.247 71.15.117.184