Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.56.55.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.56.55.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:04:30 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 68.55.56.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.55.56.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.66.224.56 attack
xmlrpc attack
2020-01-05 21:12:46
51.75.206.42 attackbots
Jan  5 03:42:22 vps46666688 sshd[14801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.206.42
Jan  5 03:42:23 vps46666688 sshd[14801]: Failed password for invalid user jboss from 51.75.206.42 port 52088 ssh2
...
2020-01-05 21:06:40
61.152.125.28 attackbots
Jul 31 22:04:42 vpn sshd[15876]: Invalid user administrator from 61.152.125.28
Jul 31 22:04:42 vpn sshd[15876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.152.125.28
Jul 31 22:04:44 vpn sshd[15876]: Failed password for invalid user administrator from 61.152.125.28 port 3393 ssh2
Jul 31 22:04:53 vpn sshd[15878]: Invalid user administrator from 61.152.125.28
Jul 31 22:04:53 vpn sshd[15878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.152.125.28
2020-01-05 21:06:10
109.117.218.234 attack
firewall-block, port(s): 23/tcp
2020-01-05 21:30:19
61.149.7.166 attackspambots
Feb 24 19:51:33 vpn sshd[2696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.149.7.166
Feb 24 19:51:35 vpn sshd[2696]: Failed password for invalid user elasticsearch from 61.149.7.166 port 36333 ssh2
Feb 24 20:01:22 vpn sshd[2771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.149.7.166
2020-01-05 21:15:18
61.129.42.243 attackbots
Feb 23 12:47:11 vpn sshd[25930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.129.42.243
Feb 23 12:47:14 vpn sshd[25930]: Failed password for invalid user noc from 61.129.42.243 port 56324 ssh2
Feb 23 12:52:24 vpn sshd[25947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.129.42.243
2020-01-05 21:23:55
61.139.124.136 attackbots
Apr  9 19:20:14 vpn sshd[26951]: Invalid user admin from 61.139.124.136
Apr  9 19:20:14 vpn sshd[26951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.139.124.136
Apr  9 19:20:16 vpn sshd[26951]: Failed password for invalid user admin from 61.139.124.136 port 40321 ssh2
Apr  9 19:20:19 vpn sshd[26951]: Failed password for invalid user admin from 61.139.124.136 port 40321 ssh2
Apr  9 19:20:20 vpn sshd[26951]: Failed password for invalid user admin from 61.139.124.136 port 40321 ssh2
2020-01-05 21:17:50
61.149.21.66 attackbots
Jan 24 15:45:13 vpn sshd[341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.149.21.66
Jan 24 15:45:16 vpn sshd[341]: Failed password for invalid user vftp from 61.149.21.66 port 46109 ssh2
Jan 24 15:54:16 vpn sshd[350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.149.21.66
2020-01-05 21:15:01
81.214.205.69 attackbotsspam
Unauthorized connection attempt detected from IP address 81.214.205.69 to port 23
2020-01-05 21:43:58
98.242.241.204 attack
Unauthorized connection attempt detected from IP address 98.242.241.204 to port 81
2020-01-05 21:42:41
92.63.194.26 attackbots
Jan  5 13:25:19 sxvn sshd[3967766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
2020-01-05 21:07:33
61.177.172.188 attackbots
Feb 16 04:53:18 vpn sshd[31370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.188  user=root
Feb 16 04:53:20 vpn sshd[31370]: Failed password for root from 61.177.172.188 port 10477 ssh2
Feb 16 04:54:20 vpn sshd[31372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.188  user=root
Feb 16 04:54:22 vpn sshd[31372]: Failed password for root from 61.177.172.188 port 39023 ssh2
Feb 16 04:54:50 vpn sshd[31374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.188  user=root
2020-01-05 21:03:12
27.38.78.3 attackspam
Port 1433 Scan
2020-01-05 21:27:55
61.131.207.176 attack
Oct  4 01:15:54 vpn sshd[24050]: Invalid user cyrus from 61.131.207.176
Oct  4 01:15:54 vpn sshd[24050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.131.207.176
Oct  4 01:15:56 vpn sshd[24050]: Failed password for invalid user cyrus from 61.131.207.176 port 56232 ssh2
Oct  4 01:20:41 vpn sshd[24078]: Invalid user zenenko from 61.131.207.176
Oct  4 01:20:41 vpn sshd[24078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.131.207.176
2020-01-05 21:20:22
122.116.39.137 attackbots
Unauthorized connection attempt detected from IP address 122.116.39.137 to port 445
2020-01-05 21:41:09

Recently Reported IPs

230.54.161.253 117.71.61.236 113.59.25.13 145.205.187.178
248.136.216.181 176.149.11.116 28.221.14.203 64.38.243.142
161.20.60.208 88.222.164.248 101.56.149.253 221.239.156.112
166.223.203.224 90.123.46.157 212.132.55.6 149.249.93.18
159.93.207.245 42.175.85.149 208.206.118.229 167.33.162.218