Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.140.159.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55806
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.140.159.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 07:08:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 56.159.140.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.159.140.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.6.131.146 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:23:52
115.73.238.52 attackspambots
23/tcp
[2020-02-17]1pkt
2020-02-17 23:34:06
61.216.31.26 attack
23/tcp
[2020-02-17]1pkt
2020-02-17 23:56:35
176.43.128.46 attackspam
9300/tcp
[2020-02-17]1pkt
2020-02-17 23:54:04
213.57.78.231 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:49:59
78.128.113.91 attackbots
2020-02-17 16:23:30 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=adminqwe@no-server.de\)
2020-02-17 16:23:37 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=adminqwe\)
2020-02-17 16:26:11 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=admin999@no-server.de\)
2020-02-17 16:26:18 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=admin999\)
2020-02-17 16:30:29 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=admin3@no-server.de\)
...
2020-02-17 23:43:08
78.187.109.108 attackbots
445/tcp
[2020-02-17]1pkt
2020-02-17 23:35:15
218.159.249.54 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:41:08
213.6.111.243 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:31:46
206.189.129.174 attackbots
Feb 17 15:06:07 amit sshd\[9857\]: Invalid user sammy from 206.189.129.174
Feb 17 15:06:07 amit sshd\[9857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.129.174
Feb 17 15:06:09 amit sshd\[9857\]: Failed password for invalid user sammy from 206.189.129.174 port 50298 ssh2
...
2020-02-17 23:37:42
213.59.156.187 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:45:36
14.176.228.148 attackspambots
445/tcp
[2020-02-17]1pkt
2020-02-17 23:29:05
195.175.74.82 attack
1433/tcp
[2020-02-17]1pkt
2020-02-17 23:31:01
51.91.212.81 attackbotsspam
Feb 17 22:07:43 staklim-malang postfix/smtpd[14024]: lost connection after UNKNOWN from ns3156319.ip-51-91-212.eu[51.91.212.81]
...
2020-02-17 23:22:08
49.235.107.51 attackspam
$f2bV_matches
2020-02-17 23:26:08

Recently Reported IPs

251.167.144.104 222.13.38.57 133.185.124.25 5.214.39.89
33.246.79.112 28.11.152.232 251.205.189.14 36.88.139.112
116.197.152.231 75.35.68.233 126.39.40.101 87.152.44.20
90.24.201.125 255.36.32.45 160.157.84.92 161.112.138.28
166.111.150.48 162.221.137.96 50.143.114.223 255.40.156.237