Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.106.99.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.106.99.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 00:34:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 248.99.106.56.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 56.106.99.248.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
116.228.160.20 attackbotsspam
Aug  3 16:52:54 firewall sshd[15020]: Failed password for root from 116.228.160.20 port 48887 ssh2
Aug  3 16:56:24 firewall sshd[16211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.160.20  user=root
Aug  3 16:56:25 firewall sshd[16211]: Failed password for root from 116.228.160.20 port 48497 ssh2
...
2020-08-04 04:05:27
132.232.68.138 attackspambots
2020-08-03T20:43:27.863273mail.broermann.family sshd[18309]: Failed password for root from 132.232.68.138 port 36778 ssh2
2020-08-03T20:48:06.541925mail.broermann.family sshd[18516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.138  user=root
2020-08-03T20:48:08.562788mail.broermann.family sshd[18516]: Failed password for root from 132.232.68.138 port 54616 ssh2
2020-08-03T20:52:40.077707mail.broermann.family sshd[18761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.138  user=root
2020-08-03T20:52:42.380348mail.broermann.family sshd[18761]: Failed password for root from 132.232.68.138 port 44212 ssh2
...
2020-08-04 04:00:08
68.183.146.249 attackspambots
68.183.146.249 - - \[03/Aug/2020:21:06:50 +0200\] "POST /wp-login.php HTTP/1.0" 200 6827 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
68.183.146.249 - - \[03/Aug/2020:21:06:51 +0200\] "POST /wp-login.php HTTP/1.0" 200 6642 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
68.183.146.249 - - \[03/Aug/2020:21:06:53 +0200\] "POST /wp-login.php HTTP/1.0" 200 6639 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-04 03:45:28
191.249.162.99 attackbots
Automatic report - Port Scan Attack
2020-08-04 04:01:11
27.74.123.63 attack
Port probing on unauthorized port 23
2020-08-04 04:07:56
154.28.188.38 attack
Tried to log in with admin credential into my qnap
2020-08-04 03:37:58
193.77.155.50 attackbotsspam
Aug  3 21:50:10 fhem-rasp sshd[26748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.155.50  user=root
Aug  3 21:50:12 fhem-rasp sshd[26748]: Failed password for root from 193.77.155.50 port 48414 ssh2
...
2020-08-04 03:54:07
172.69.68.188 attackbots
Aug 3 14:19:02 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.68.188 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=33335 DF PROTO=TCP SPT=53284 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 Aug 3 14:19:03 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.68.188 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=33336 DF PROTO=TCP SPT=53284 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 Aug 3 14:19:06 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.68.188 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=33337 DF PROTO=TCP SPT=53284 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
2020-08-04 03:47:02
49.206.15.10 attackspambots
Port probing on unauthorized port 445
2020-08-04 03:58:51
59.144.94.186 attackbots
20/8/3@08:18:43: FAIL: Alarm-Network address from=59.144.94.186
...
2020-08-04 04:00:54
58.102.31.36 attackspambots
Aug  3 19:31:15 localhost sshd[130938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.102.31.36  user=root
Aug  3 19:31:17 localhost sshd[130938]: Failed password for root from 58.102.31.36 port 53770 ssh2
Aug  3 19:35:35 localhost sshd[743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.102.31.36  user=root
Aug  3 19:35:37 localhost sshd[743]: Failed password for root from 58.102.31.36 port 60272 ssh2
Aug  3 19:40:01 localhost sshd[1236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.102.31.36  user=root
Aug  3 19:40:03 localhost sshd[1236]: Failed password for root from 58.102.31.36 port 38506 ssh2
...
2020-08-04 03:40:43
24.154.178.229 attackspam
Hits on port : 23
2020-08-04 03:51:55
175.126.176.21 attack
Aug  3 21:41:13 vps639187 sshd\[32178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.21  user=root
Aug  3 21:41:15 vps639187 sshd\[32178\]: Failed password for root from 175.126.176.21 port 34028 ssh2
Aug  3 21:45:34 vps639187 sshd\[32282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.21  user=root
...
2020-08-04 04:10:10
80.82.77.33 attackbotsspam
Aug  3 21:53:41 debian-2gb-nbg1-2 kernel: \[18742890.368657\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.33 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=120 ID=57553 PROTO=TCP SPT=20624 DPT=44818 WINDOW=2734 RES=0x00 SYN URGP=0
2020-08-04 04:02:18
41.193.122.77 attackbots
Aug  3 20:59:50 jane sshd[17452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.193.122.77 
...
2020-08-04 03:38:44

Recently Reported IPs

109.50.141.169 22.62.44.188 177.199.195.76 251.150.190.12
253.233.228.3 98.195.231.244 95.12.223.177 99.171.151.6
251.26.129.73 115.87.203.60 29.14.216.95 141.191.161.128
12.27.150.182 124.161.48.218 16.76.183.178 106.235.6.35
202.8.251.129 103.74.151.65 238.208.128.60 158.10.95.120