Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.114.104.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.114.104.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 15:41:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 40.104.114.56.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.104.114.56.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.82.135.53 attackspambots
SSH Invalid Login
2020-07-15 07:04:23
95.211.208.50 attackspambots
Jul 14 19:25:36 l03 postfix/smtpd[30619]: lost connection after AUTH from unknown[95.211.208.50]
Jul 14 19:25:36 l03 postfix/smtpd[30619]: lost connection after AUTH from unknown[95.211.208.50]
Jul 14 19:25:36 l03 postfix/smtpd[30619]: lost connection after AUTH from unknown[95.211.208.50]
Jul 14 19:25:37 l03 postfix/smtpd[30619]: lost connection after AUTH from unknown[95.211.208.50]
Jul 14 19:25:37 l03 postfix/smtpd[30619]: lost connection after AUTH from unknown[95.211.208.50]
Jul 14 19:25:37 l03 postfix/smtpd[30619]: lost connection after AUTH from unknown[95.211.208.50]
...
2020-07-15 06:58:04
206.189.92.162 attackbots
 TCP (SYN) 206.189.92.162:55853 -> port 8537, len 44
2020-07-15 06:49:12
104.168.28.195 attackspam
Jul 14 22:07:08 pkdns2 sshd\[45676\]: Invalid user cpd from 104.168.28.195Jul 14 22:07:10 pkdns2 sshd\[45676\]: Failed password for invalid user cpd from 104.168.28.195 port 36329 ssh2Jul 14 22:11:23 pkdns2 sshd\[45863\]: Invalid user versa from 104.168.28.195Jul 14 22:11:25 pkdns2 sshd\[45863\]: Failed password for invalid user versa from 104.168.28.195 port 35317 ssh2Jul 14 22:15:34 pkdns2 sshd\[46038\]: Invalid user wxm from 104.168.28.195Jul 14 22:15:36 pkdns2 sshd\[46038\]: Failed password for invalid user wxm from 104.168.28.195 port 34305 ssh2
...
2020-07-15 06:55:15
165.227.117.255 attackspambots
Invalid user lby from 165.227.117.255 port 42512
2020-07-15 06:43:43
222.186.31.83 attackbotsspam
Jul 15 00:31:57 home sshd[19728]: Failed password for root from 222.186.31.83 port 15652 ssh2
Jul 15 00:31:59 home sshd[19728]: Failed password for root from 222.186.31.83 port 15652 ssh2
Jul 15 00:32:02 home sshd[19728]: Failed password for root from 222.186.31.83 port 15652 ssh2
Jul 15 00:32:06 home sshd[19740]: Failed password for root from 222.186.31.83 port 31895 ssh2
...
2020-07-15 06:36:10
146.185.129.216 attackspambots
Jul 14 20:12:12 localhost sshd[128654]: Invalid user rabie from 146.185.129.216 port 51527
Jul 14 20:12:12 localhost sshd[128654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.129.216
Jul 14 20:12:12 localhost sshd[128654]: Invalid user rabie from 146.185.129.216 port 51527
Jul 14 20:12:14 localhost sshd[128654]: Failed password for invalid user rabie from 146.185.129.216 port 51527 ssh2
Jul 14 20:18:21 localhost sshd[129288]: Invalid user lila from 146.185.129.216 port 49658
...
2020-07-15 06:48:35
172.111.179.182 attackbotsspam
Jul 15 00:58:45 vps687878 sshd\[3152\]: Invalid user ry from 172.111.179.182 port 60598
Jul 15 00:58:45 vps687878 sshd\[3152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.111.179.182
Jul 15 00:58:47 vps687878 sshd\[3152\]: Failed password for invalid user ry from 172.111.179.182 port 60598 ssh2
Jul 15 01:00:24 vps687878 sshd\[3292\]: Invalid user vyatta from 172.111.179.182 port 55150
Jul 15 01:00:24 vps687878 sshd\[3292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.111.179.182
...
2020-07-15 07:06:03
45.112.247.15 attack
IP 45.112.247.15 attacked honeypot on port: 1433 at 7/14/2020 11:25:24 AM
2020-07-15 06:42:15
78.128.113.42 attack
Jul 15 00:52:17 debian-2gb-nbg1-2 kernel: \[17025704.868061\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=78.128.113.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=37660 PROTO=TCP SPT=45197 DPT=3253 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-15 07:08:24
62.121.84.109 attackspam
Automatic report - XMLRPC Attack
2020-07-15 07:15:22
24.125.237.85 attackspambots
Unauthorized connection attempt detected from IP address 24.125.237.85 to port 23
2020-07-15 06:56:23
50.3.78.205 attackspambots
Postfix RBL failed
2020-07-15 07:07:12
137.191.238.226 attackbots
Honeypot attack, port: 139, PTR: gpc.opw.ie.
2020-07-15 07:06:37
118.160.77.8 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-15 06:37:56

Recently Reported IPs

178.74.152.50 199.161.97.54 217.150.100.185 46.10.217.172
17.150.181.70 214.37.24.31 118.240.194.219 56.20.47.25
75.0.18.113 89.21.226.118 6.186.251.37 229.163.254.140
207.226.213.231 50.20.5.231 238.129.134.250 229.117.147.147
252.122.195.216 200.211.145.35 84.209.247.26 160.69.68.197