Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       207.56.0.0 - 207.57.255.255
CIDR:           207.56.0.0/15
NetName:        NTTA-207-56
NetHandle:      NET-207-56-0-0-1
Parent:         NET207 (NET-207-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   NTT America, Inc. (NTTAM-1)
RegDate:        1996-02-16
Updated:        2026-02-10
Comment:        Geofeed https://geo.ip.gin.ntt.net/geofeeds/geofeeds.csv
Comment:        Reassignment information for this block is
Comment:        available at rwhois.gin.ntt.net port 4321
Ref:            https://rdap.arin.net/registry/ip/207.56.0.0


OrgName:        NTT America, Inc.
OrgId:          NTTAM-1
Address:        15809 Bear Creek Pkwy
Address:        Suite 320
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        2005-12-08
Updated:        2024-03-04
Ref:            https://rdap.arin.net/registry/entity/NTTAM-1

ReferralServer:  rwhois://rwhois.gin.ntt.net:4321

OrgNOCHandle: NASC-ARIN
OrgNOCName:   NTT America Support Contact
OrgNOCPhone:  +1-877-688-6625 
OrgNOCEmail:  ce-support@gin.ntt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NASC-ARIN

OrgRoutingHandle: PEERI-ARIN
OrgRoutingName:   Peering
OrgRoutingPhone:  +1-877-688-6625 
OrgRoutingEmail:  peering@ntt.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/PEERI-ARIN

OrgTechHandle: VIPAR-ARIN
OrgTechName:   VIPAR
OrgTechPhone:  +1-877-688-6625 
OrgTechEmail:  ipr@gin.ntt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/VIPAR-ARIN

OrgAbuseHandle: NAAC-ARIN
OrgAbuseName:   NTT America Abuse Contact
OrgAbusePhone:  +1-877-688-6625 
OrgAbuseEmail:  abuse@ntt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NAAC-ARIN

OrgTechHandle: CANDE70-ARIN
OrgTechName:   Candela, Massimo 
OrgTechPhone:  +1-214-915-1366 
OrgTechEmail:  massimo@ntt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/CANDE70-ARIN

RTechHandle: VIA4-ORG-ARIN
RTechName:   VIPAR
RTechPhone:  +1-877-688-6625 
RTechEmail:  ipr@gin.ntt.net
RTechRef:    https://rdap.arin.net/registry/entity/VIA4-ORG-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.gin.ntt.net:4321.

%rwhois V-1.5:0078b6:00 rwhois.gin.ntt.net (Vipar 0.1a. Comments to ipr@gin.ntt.net)
network:Class-Name:network
network:Auth-Area:207.56.0.0/15
network:ID:NETBLK-VRIO-207-056.127.0.0.1/32
network:Handle:NETBLK-VRIO-207-056
network:Network-Name:VRIO-207-056
network:IP-Network:207.56.0.0/15
network:In-Addr-Server;I:AUTH21-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH22-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH23-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH24-GIN-HST.127.0.0.1/32
network:In-Addr-Server;I:AUTH25-GIN-HST.127.0.0.1/32
network:IP-Network-Block:207.56.0.0 - 207.57.255.255
network:Org-Name:NTT America, Inc.
network:Street-Address:8300 E Maplewood Ave. Suite 400
network:City:Greenwood Village
network:State:CO
network:Postal-Code:80111
network:Country-Code:US
network:Tech-Contact;I:VIA4-ORG-ARIN.127.0.0.1/32
network:Created:1999-12-15 00:19:19+00
network:Updated:2025-07-24 13:54:38.791836+00

%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.56.13.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.56.13.96.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 04:30:16 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 96.13.56.207.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 96.13.56.207.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
208.83.85.55 attackspambots
20/9/4@12:51:22: FAIL: IoT-Telnet address from=208.83.85.55
...
2020-09-05 06:39:15
197.49.201.192 attack
Port Scan detected!
...
2020-09-05 06:39:29
5.135.177.5 attackbots
5.135.177.5 - - [04/Sep/2020:18:51:33 +0200] "GET /wp-login.php HTTP/1.1" 200 8712 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.135.177.5 - - [04/Sep/2020:18:51:34 +0200] "POST /wp-login.php HTTP/1.1" 200 9008 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.135.177.5 - - [04/Sep/2020:18:51:35 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-05 06:28:16
188.165.138.11 attackbots
Dovecot Invalid User Login Attempt.
2020-09-05 06:28:38
79.46.191.8 attack
Automatic report - Port Scan Attack
2020-09-05 06:32:19
179.56.28.64 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 06:35:23
222.186.42.213 attack
Sep  4 22:12:00 rush sshd[27094]: Failed password for root from 222.186.42.213 port 51278 ssh2
Sep  4 22:12:08 rush sshd[27096]: Failed password for root from 222.186.42.213 port 14064 ssh2
...
2020-09-05 06:15:49
122.51.192.105 attackspambots
Sep 5 00:29:57 *hidden* sshd[5032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105 Sep 5 00:29:59 *hidden* sshd[5032]: Failed password for invalid user bruna from 122.51.192.105 port 51796 ssh2 Sep 5 00:36:37 *hidden* sshd[6499]: Invalid user memcached from 122.51.192.105 port 55646
2020-09-05 06:41:42
2.132.233.234 attackbots
Sep  4 18:51:29 mellenthin postfix/smtpd[32087]: NOQUEUE: reject: RCPT from unknown[2.132.233.234]: 554 5.7.1 Service unavailable; Client host [2.132.233.234] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/2.132.233.234; from= to= proto=ESMTP helo=<[2.132.233.234]>
2020-09-05 06:34:11
195.54.167.167 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-04T17:31:57Z and 2020-09-04T18:03:32Z
2020-09-05 06:37:05
159.203.184.19 attack
Sep  4 12:52:54 ny01 sshd[7121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.184.19
Sep  4 12:52:56 ny01 sshd[7121]: Failed password for invalid user postgres from 159.203.184.19 port 35094 ssh2
Sep  4 12:56:31 ny01 sshd[7933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.184.19
2020-09-05 06:16:46
218.92.0.223 attackspambots
Sep  5 00:38:55 vps639187 sshd\[3301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223  user=root
Sep  5 00:38:57 vps639187 sshd\[3301\]: Failed password for root from 218.92.0.223 port 22180 ssh2
Sep  5 00:39:01 vps639187 sshd\[3301\]: Failed password for root from 218.92.0.223 port 22180 ssh2
...
2020-09-05 06:47:26
189.80.37.70 attackbotsspam
SSH Invalid Login
2020-09-05 06:14:27
177.152.124.19 attack
Lines containing failures of 177.152.124.19
Sep  1 21:04:10 metroid sshd[17018]: refused connect from 177.152.124.19 (177.152.124.19)
Sep  2 00:13:03 metroid sshd[1084]: refused connect from 177.152.124.19 (177.152.124.19)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.152.124.19
2020-09-05 06:30:36
173.212.230.20 attackbotsspam
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2020-09-05 06:50:43

Recently Reported IPs

77.221.141.115 45.156.128.10 85.217.149.32 134.35.157.52
2606:4700:10::ac43:1258 2606:4700:10::6816:3192 2606:4700:10::6816:1438 2606:4700:10::ac43:786
2606:4700:10::6814:5788 2606:4700:10::ac43:2374 2606:4700:10::6814:5274 2606:4700:10::6814:6768
2606:4700:10::6814:6866 54.242.154.56 54.147.211.165 44.203.192.145
20.63.60.10 20.65.193.188 39.165.57.48 212.73.148.15