Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.175.56.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.175.56.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 10:01:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 20.56.175.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.56.175.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.228.207.1 attackbotsspam
0,28-02/26 [bc02/m19] PostRequest-Spammer scoring: maputo01_x2b
2019-10-26 12:55:09
62.108.36.188 attackbotsspam
2019-10-26T04:48:22.901636shield sshd\[5644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.108.36.188  user=root
2019-10-26T04:48:24.387977shield sshd\[5644\]: Failed password for root from 62.108.36.188 port 54170 ssh2
2019-10-26T04:51:53.156920shield sshd\[6635\]: Invalid user ai from 62.108.36.188 port 38164
2019-10-26T04:51:53.165205shield sshd\[6635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.108.36.188
2019-10-26T04:51:55.292542shield sshd\[6635\]: Failed password for invalid user ai from 62.108.36.188 port 38164 ssh2
2019-10-26 12:54:35
2a00:2381:e76:0:4ed9:8fff:fe4f:2222 attackspambots
LAV,DEF GET /wp-login.php
2019-10-26 12:59:24
190.210.42.82 attack
enlinea.de 190.210.42.82 \[26/Oct/2019:05:53:25 +0200\] "POST /wp-login.php HTTP/1.1" 200 5636 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
enlinea.de 190.210.42.82 \[26/Oct/2019:05:53:26 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4142 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-26 12:53:53
1.52.238.150 attackspambots
SMB Server BruteForce Attack
2019-10-26 13:10:00
218.161.80.118 attackbotsspam
Fail2Ban Ban Triggered
2019-10-26 12:57:24
121.137.77.82 attackbotsspam
2019-10-25T22:11:49.466409suse-nuc sshd[4846]: error: maximum authentication attempts exceeded for root from 121.137.77.82 port 42303 ssh2 [preauth]
...
2019-10-26 13:12:39
117.48.208.71 attackspambots
2019-10-26T04:42:50.441670abusebot-5.cloudsearch.cf sshd\[12883\]: Invalid user user from 117.48.208.71 port 47160
2019-10-26T04:42:50.447290abusebot-5.cloudsearch.cf sshd\[12883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71
2019-10-26 13:09:16
5.196.201.7 attackspambots
Oct 26 05:52:28 mail postfix/smtpd\[8336\]: warning: unknown\[5.196.201.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 26 06:11:58 mail postfix/smtpd\[9841\]: warning: unknown\[5.196.201.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 26 06:16:28 mail postfix/smtpd\[10895\]: warning: unknown\[5.196.201.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 26 06:48:11 mail postfix/smtpd\[12249\]: warning: unknown\[5.196.201.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-26 12:52:07
103.83.192.112 attackbots
goldgier-uhren-ankauf.de:80 103.83.192.112 - - \[26/Oct/2019:05:53:24 +0200\] "POST /xmlrpc.php HTTP/1.1" 301 459 "-" "WordPress/4.5.7\; http://tajbabacontracting.com"
goldgier-uhren-ankauf.de 103.83.192.112 \[26/Oct/2019:05:53:24 +0200\] "POST /xmlrpc.php HTTP/1.1" 302 4117 "-" "WordPress/4.5.7\; http://tajbabacontracting.com"
2019-10-26 12:56:22
78.36.97.216 attack
Oct 26 06:32:52 MK-Soft-VM4 sshd[31565]: Failed password for root from 78.36.97.216 port 60686 ssh2
...
2019-10-26 12:58:20
152.32.130.99 attackspambots
Oct 26 06:45:50 dedicated sshd[28582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.130.99  user=root
Oct 26 06:45:53 dedicated sshd[28582]: Failed password for root from 152.32.130.99 port 56146 ssh2
2019-10-26 12:45:58
13.232.85.67 attack
2019-10-26T04:26:32.069759abusebot-5.cloudsearch.cf sshd\[12708\]: Invalid user russel from 13.232.85.67 port 43588
2019-10-26 12:40:43
195.34.97.125 attackbots
SMB Server BruteForce Attack
2019-10-26 13:19:49
106.13.101.129 attackspam
Oct 26 06:48:25 sauna sshd[235670]: Failed password for root from 106.13.101.129 port 33732 ssh2
Oct 26 06:53:07 sauna sshd[235741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.101.129
...
2019-10-26 13:04:07

Recently Reported IPs

83.58.100.72 53.97.141.49 229.136.185.46 253.16.57.201
234.244.128.176 132.178.46.122 26.114.180.93 25.0.177.155
29.118.88.250 240.49.33.83 158.31.34.120 142.41.91.176
86.132.14.200 140.121.151.153 188.172.108.161 220.238.148.28
24.144.143.134 82.139.103.38 160.164.154.115 132.249.215.241