Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.107.39.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.107.39.49.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 28 07:26:01 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 49.39.107.56.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.39.107.56.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.129.149.80 attackspambots
Fail2Ban Ban Triggered
2020-07-04 06:20:48
36.70.89.170 attackspambots
Unauthorized connection attempt from IP address 36.70.89.170 on Port 445(SMB)
2020-07-04 06:09:04
186.226.1.246 attackspam
Jul  3 08:26:28 main sshd[13668]: Failed password for invalid user admin from 186.226.1.246 port 36250 ssh2
2020-07-04 05:51:00
148.70.14.121 attackbotsspam
Invalid user gl from 148.70.14.121 port 36918
2020-07-04 06:23:30
167.172.36.232 attackbots
SSH Invalid Login
2020-07-04 06:21:37
49.235.219.230 attackspam
Jul  4 00:39:57 lukav-desktop sshd\[29814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.219.230  user=root
Jul  4 00:39:59 lukav-desktop sshd\[29814\]: Failed password for root from 49.235.219.230 port 56496 ssh2
Jul  4 00:43:58 lukav-desktop sshd\[29940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.219.230  user=root
Jul  4 00:44:00 lukav-desktop sshd\[29940\]: Failed password for root from 49.235.219.230 port 47482 ssh2
Jul  4 00:48:02 lukav-desktop sshd\[30031\]: Invalid user cmc from 49.235.219.230
2020-07-04 05:59:56
138.197.129.38 attack
sshd jail - ssh hack attempt
2020-07-04 05:59:09
14.211.2.248 attack
2020-07-03T22:02:19.365526 X postfix/smtpd[1053023]: NOQUEUE: reject: RCPT from unknown[14.211.2.248]: 554 5.7.1 Service unavailable; Client host [14.211.2.248] blocked using zen.spamhaus.org; from= to= proto=SMTP helo=
2020-07-04 05:56:49
186.225.96.34 attack
Unauthorized connection attempt from IP address 186.225.96.34 on Port 445(SMB)
2020-07-04 06:14:37
174.219.17.70 attack
Brute forcing email accounts
2020-07-04 06:21:10
103.246.116.1 attackbots
Unauthorized connection attempt from IP address 103.246.116.1 on Port 445(SMB)
2020-07-04 05:51:40
2.233.125.227 attack
SSH Invalid Login
2020-07-04 06:01:12
218.92.0.215 attackspambots
Jul  3 22:08:35 game-panel sshd[20484]: Failed password for root from 218.92.0.215 port 63483 ssh2
Jul  3 22:08:44 game-panel sshd[20487]: Failed password for root from 218.92.0.215 port 54747 ssh2
2020-07-04 06:11:54
182.151.209.132 attackspam
Unauthorized connection attempt from IP address 182.151.209.132 on Port 445(SMB)
2020-07-04 06:15:27
71.42.236.91 attackspam
Wordpress_xmlrpc_attack
2020-07-04 05:52:55

Recently Reported IPs

91.58.166.5 34.63.148.164 64.37.62.214 0.211.5.207
190.131.246.255 34.70.146.38 217.184.74.73 237.156.45.53
221.35.184.179 113.181.180.83 218.125.82.230 43.28.80.74
231.194.115.138 91.146.246.232 79.133.217.64 213.255.223.5
254.143.92.100 221.251.203.72 102.98.199.86 254.80.45.111