Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.56.4.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;219.56.4.138.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111502 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 16 04:41:02 CST 2019
;; MSG SIZE  rcvd: 116
Host info
138.4.56.219.in-addr.arpa domain name pointer softbank219056004138.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.4.56.219.in-addr.arpa	name = softbank219056004138.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.128.14.106 attack
ssh failed login
2019-11-12 21:47:53
103.235.170.195 attackbotsspam
Nov 12 08:05:50 localhost sshd\[27687\]: Invalid user test from 103.235.170.195 port 53010
Nov 12 08:05:50 localhost sshd\[27687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.170.195
Nov 12 08:05:52 localhost sshd\[27687\]: Failed password for invalid user test from 103.235.170.195 port 53010 ssh2
Nov 12 08:10:09 localhost sshd\[27875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.170.195  user=root
Nov 12 08:10:11 localhost sshd\[27875\]: Failed password for root from 103.235.170.195 port 34206 ssh2
...
2019-11-12 21:14:28
181.49.117.130 attack
$f2bV_matches
2019-11-12 21:19:42
119.90.43.106 attack
Nov 12 13:07:24 MK-Soft-VM3 sshd[27508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.43.106 
Nov 12 13:07:25 MK-Soft-VM3 sshd[27508]: Failed password for invalid user cr from 119.90.43.106 port 44790 ssh2
...
2019-11-12 21:09:00
95.43.238.150 attack
Microsoft-Windows-Security-Auditing
2019-11-12 21:22:10
178.32.129.115 attackspambots
Nov 12 13:28:33 vpn01 sshd[6372]: Failed password for root from 178.32.129.115 port 49660 ssh2
...
2019-11-12 21:53:32
46.38.144.32 attackbots
Nov 12 14:07:31 relay postfix/smtpd\[20949\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 12 14:08:03 relay postfix/smtpd\[27111\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 12 14:09:03 relay postfix/smtpd\[21462\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 12 14:09:36 relay postfix/smtpd\[30317\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 12 14:10:37 relay postfix/smtpd\[20949\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-12 21:12:53
182.117.87.247 attackbotsspam
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-11-12 21:43:18
187.121.205.199 attackbotsspam
Honeypot attack, port: 23, PTR: 187-121-205-199.wifi.dyn.lancernet.com.br.
2019-11-12 21:37:05
14.184.244.37 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-11-12 21:11:00
159.203.197.2 attack
firewall-block, port(s): 25180/tcp
2019-11-12 21:28:43
222.186.180.6 attackbotsspam
$f2bV_matches
2019-11-12 21:22:44
129.28.188.115 attack
CyberHackers.eu > SSH Bruteforce attempt!
2019-11-12 21:34:37
200.229.90.17 attack
Honeypot attack, port: 23, PTR: 200-229-90-17.netturbo.com.br.
2019-11-12 21:26:57
113.94.48.44 attackspam
Port scan
2019-11-12 21:54:28

Recently Reported IPs

203.205.152.50 0.213.31.17 222.73.66.231 82.185.53.122
223.151.226.111 96.64.241.132 93.205.207.247 128.128.193.151
99.50.80.169 112.253.101.23 196.202.152.242 211.217.180.94
220.125.155.124 192.90.9.45 64.222.198.214 233.84.125.101
167.80.202.95 36.218.177.122 93.67.145.196 120.30.231.193