Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.56.57.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.56.57.114.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:24:55 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 114.57.56.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.57.56.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.142.151.162 attackbotsspam
Unauthorized connection attempt from IP address 202.142.151.162 on Port 445(SMB)
2020-01-15 01:03:32
173.236.168.101 attack
Automatic report - XMLRPC Attack
2020-01-15 00:40:12
113.22.79.234 attackspam
Unauthorized connection attempt detected from IP address 113.22.79.234 to port 23 [T]
2020-01-15 00:45:36
205.251.218.97 attackspam
Automatic report generated by Wazuh
2020-01-15 00:36:11
103.66.78.170 attackspam
Unauthorized connection attempt from IP address 103.66.78.170 on Port 445(SMB)
2020-01-15 00:26:29
186.206.157.26 attackspambots
Jan 13 03:05:02 git-ovh sshd[9027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.26 
Jan 13 03:05:05 git-ovh sshd[9027]: Failed password for invalid user yyy from 186.206.157.26 port 34454 ssh2
...
2020-01-15 01:01:44
36.69.81.255 attackspam
Unauthorized connection attempt from IP address 36.69.81.255 on Port 445(SMB)
2020-01-15 01:00:45
166.62.6.51 attack
Indian SEO spam - From: Mitali 
Subject: SEO Services for Higher Conversion Rate
2020-01-15 01:03:45
14.174.41.29 attack
Unauthorized connection attempt from IP address 14.174.41.29 on Port 445(SMB)
2020-01-15 00:45:56
51.77.111.30 attack
Jan 14 14:00:16 SilenceServices sshd[4254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.111.30
Jan 14 14:00:18 SilenceServices sshd[4254]: Failed password for invalid user minecraft from 51.77.111.30 port 52948 ssh2
Jan 14 14:01:47 SilenceServices sshd[4973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.111.30
2020-01-15 00:31:49
114.113.157.32 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-15 00:37:37
94.207.41.237 attackbots
ICMP MH Probe, Scan /Distributed -
2020-01-15 00:25:49
189.144.37.145 attackbots
Unauthorized connection attempt from IP address 189.144.37.145 on Port 445(SMB)
2020-01-15 01:00:06
128.199.247.115 attack
Unauthorized connection attempt detected from IP address 128.199.247.115 to port 2220 [J]
2020-01-15 00:58:36
213.244.123.26 attackspambots
Unauthorized connection attempt from IP address 213.244.123.26 on Port 445(SMB)
2020-01-15 00:35:52

Recently Reported IPs

191.37.220.101 131.108.234.60 60.167.117.125 177.91.162.86
201.182.55.77 171.101.20.106 5.255.99.214 120.85.182.52
82.127.177.35 187.178.230.95 42.188.33.226 103.161.42.80
213.166.77.104 185.170.63.121 58.62.86.206 120.86.254.54
195.222.39.202 89.237.192.215 177.135.79.243 45.172.92.122