Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.56.231.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2429
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.56.231.214.			IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010700 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 07 19:35:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
214.231.56.5.in-addr.arpa domain name pointer HSI-KBW-5-56-231-214.hsi17.kabel-badenwuerttemberg.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.231.56.5.in-addr.arpa	name = HSI-KBW-5-56-231-214.hsi17.kabel-badenwuerttemberg.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.166.188.247 attackspambots
Brute force attack stopped by firewall
2019-06-27 09:29:39
66.246.224.10 attackspam
Brute force attack stopped by firewall
2019-06-27 09:16:06
94.228.182.244 attackspambots
Jun 26 22:52:34 MK-Soft-VM5 sshd\[11198\]: Invalid user test2 from 94.228.182.244 port 52260
Jun 26 22:52:34 MK-Soft-VM5 sshd\[11198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.228.182.244
Jun 26 22:52:36 MK-Soft-VM5 sshd\[11198\]: Failed password for invalid user test2 from 94.228.182.244 port 52260 ssh2
...
2019-06-27 09:22:10
124.66.133.106 attackspam
Brute force attack stopped by firewall
2019-06-27 09:38:34
42.236.10.73 attackspam
Brute force attack stopped by firewall
2019-06-27 09:13:15
109.201.154.212 attackbots
Brute force attack stopped by firewall
2019-06-27 09:16:31
109.201.152.236 attackspam
Brute force attack stopped by firewall
2019-06-27 09:19:31
80.147.59.28 attack
2019/06/27 01:38:26 \[error\] 5118\#0: \*372 An error occurred in mail zmauth: user not found:vdmhay@bigfathog.com while SSL handshaking to lookup handler, client: 80.147.59.28:43433, server: 45.79.145.195:993, login: "vdmhay@bigfathog.com"
2019-06-27 09:52:40
220.164.2.123 attack
Brute force attack stopped by firewall
2019-06-27 09:54:17
177.91.9.15 attackbotsspam
Sending SPAM email
2019-06-27 09:46:17
109.201.154.165 attackspambots
Brute force attack stopped by firewall
2019-06-27 09:15:33
141.98.81.38 attackspam
ports scanning
2019-06-27 09:53:31
190.122.187.230 attackspambots
Brute force attack stopped by firewall
2019-06-27 09:39:58
115.92.118.52 attack
Brute force attack stopped by firewall
2019-06-27 09:45:45
81.1.242.165 attackspambots
failed_logins
2019-06-27 09:47:40

Recently Reported IPs

102.156.34.109 16.247.5.171 105.125.159.241 11.19.27.58
231.82.228.231 66.209.226.229 114.175.185.150 210.124.89.170
182.182.248.195 239.35.231.127 127.33.182.252 191.19.137.36
117.187.127.237 59.215.58.198 103.219.147.222 154.85.50.102
112.42.44.31 35.228.189.182 214.21.224.72 196.181.15.112