Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.154.21.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.154.21.145.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:56:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 145.21.154.56.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 56.154.21.145.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.129.21.2 attack
Unauthorized connection attempt detected from IP address 222.129.21.2 to port 1433
2019-12-31 21:28:40
60.165.212.98 attack
Unauthorized connection attempt detected from IP address 60.165.212.98 to port 23
2019-12-31 21:20:20
180.103.175.26 attackspam
23/tcp
[2019-12-31]1pkt
2019-12-31 21:44:01
222.186.173.142 attackspam
Dec 31 14:27:13 MK-Soft-VM5 sshd[32658]: Failed password for root from 222.186.173.142 port 39996 ssh2
...
2019-12-31 21:28:00
60.170.38.145 attackspambots
Unauthorized connection attempt detected from IP address 60.170.38.145 to port 23
2019-12-31 21:57:55
218.87.48.225 attackspambots
Unauthorized connection attempt detected from IP address 218.87.48.225 to port 445
2019-12-31 21:34:31
61.163.168.17 attack
Unauthorized connection attempt detected from IP address 61.163.168.17 to port 1433
2019-12-31 21:19:07
59.63.150.65 attackspambots
Unauthorized connection attempt detected from IP address 59.63.150.65 to port 445
2019-12-31 21:59:13
182.103.13.39 attackbotsspam
Unauthorized connection attempt detected from IP address 182.103.13.39 to port 445
2019-12-31 21:40:42
185.153.196.80 attack
ET DROP Dshield Block Listed Source group 1 - port: 3773 proto: TCP cat: Misc Attack
2019-12-31 21:36:57
52.77.31.47 attack
Unauthorised access (Dec 31) SRC=52.77.31.47 LEN=40 TTL=50 ID=23708 TCP DPT=8080 WINDOW=50097 SYN 
Unauthorised access (Dec 31) SRC=52.77.31.47 LEN=40 TTL=50 ID=9136 TCP DPT=8080 WINDOW=39514 SYN 
Unauthorised access (Dec 30) SRC=52.77.31.47 LEN=40 TTL=50 ID=23741 TCP DPT=8080 WINDOW=13471 SYN 
Unauthorised access (Dec 30) SRC=52.77.31.47 LEN=40 TTL=50 ID=57992 TCP DPT=8080 WINDOW=41192 SYN 
Unauthorised access (Dec 30) SRC=52.77.31.47 LEN=40 TTL=50 ID=39961 TCP DPT=8080 WINDOW=50097 SYN
2019-12-31 21:21:03
117.135.226.92 attack
Unauthorized connection attempt detected from IP address 117.135.226.92 to port 1433
2019-12-31 21:48:37
220.177.144.66 attackbotsspam
Unauthorized connection attempt detected from IP address 220.177.144.66 to port 445
2019-12-31 21:30:06
106.75.84.197 attack
Unauthorized connection attempt detected from IP address 106.75.84.197 to port 4840
2019-12-31 21:53:53
222.222.9.188 attackbotsspam
Unauthorized connection attempt detected from IP address 222.222.9.188 to port 21
2019-12-31 21:27:13

Recently Reported IPs

191.251.12.185 43.12.93.12 179.9.3.157 204.182.168.236
242.95.22.219 210.252.63.171 75.190.79.234 122.176.64.175
45.148.121.6 152.14.220.73 39.40.66.242 118.172.71.76
195.139.146.108 129.94.198.166 103.142.178.76 212.122.220.255
13.241.243.73 99.20.211.241 8.52.17.225 147.241.218.100