Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.40.54.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42883
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;53.40.54.56.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 22 10:12:56 CST 2019
;; MSG SIZE  rcvd: 115
Host info
56.54.40.53.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 56.54.40.53.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
139.59.92.117 attackbotsspam
3x Failed Password
2020-01-11 19:30:21
14.188.148.237 attackbotsspam
Unauthorized connection attempt from IP address 14.188.148.237 on Port 445(SMB)
2020-01-11 19:43:19
47.99.82.90 attack
Jan 11 11:23:52 prox sshd[20211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.99.82.90 
Jan 11 11:23:54 prox sshd[20211]: Failed password for invalid user user from 47.99.82.90 port 37766 ssh2
2020-01-11 19:24:02
62.210.205.155 attackspambots
Jan 11 09:11:39 host sshd[63489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-205-155.rev.poneytelecom.eu  user=root
Jan 11 09:11:41 host sshd[63489]: Failed password for root from 62.210.205.155 port 44128 ssh2
...
2020-01-11 19:55:10
14.184.250.49 attackbots
Unauthorized connection attempt from IP address 14.184.250.49 on Port 445(SMB)
2020-01-11 19:52:15
115.43.97.27 attack
1578730956 - 01/11/2020 09:22:36 Host: 115.43.97.27/115.43.97.27 Port: 445 TCP Blocked
2020-01-11 19:53:18
78.47.145.91 attack
Automatic report - XMLRPC Attack
2020-01-11 19:34:40
220.130.79.158 attack
Unauthorized connection attempt from IP address 220.130.79.158 on Port 445(SMB)
2020-01-11 19:56:10
36.91.72.219 attack
Unauthorized connection attempt from IP address 36.91.72.219 on Port 445(SMB)
2020-01-11 20:03:53
217.112.142.167 attackbotsspam
Postfix RBL failed
2020-01-11 19:33:51
111.242.198.111 attack
Unauthorized connection attempt from IP address 111.242.198.111 on Port 445(SMB)
2020-01-11 19:39:20
104.244.229.191 attackbots
Jan 11 05:48:30 grey postfix/smtpd\[10127\]: NOQUEUE: reject: RCPT from unknown\[104.244.229.191\]: 554 5.7.1 Service unavailable\; Client host \[104.244.229.191\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?104.244.229.191\; from=\ to=\ proto=ESMTP helo=\<\[104.244.229.191\]\>
...
2020-01-11 19:28:01
181.177.119.174 attack
Automatic report - Banned IP Access
2020-01-11 19:37:45
139.224.239.1 attackbots
Automatic report - XMLRPC Attack
2020-01-11 19:25:06
186.150.138.209 attackbots
Jan 11 05:48:13 grey postfix/smtpd\[10764\]: NOQUEUE: reject: RCPT from unknown\[186.150.138.209\]: 554 5.7.1 Service unavailable\; Client host \[186.150.138.209\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[186.150.138.209\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-11 19:41:58

Recently Reported IPs

188.235.138.182 108.14.126.159 188.231.142.71 188.227.195.126
107.160.241.24 188.218.176.107 188.214.104.40 188.191.34.89
109.190.1.7 188.172.94.72 13.126.93.219 188.162.166.248
138.186.251.253 104.248.90.74 188.158.101.106 188.152.203.66
188.147.39.5 188.147.37.156 188.147.181.77 188.146.234.8