Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.161.13.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.161.13.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:35:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 112.13.161.56.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.13.161.56.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.104.243 attackspambots
Jul 30 13:22:46 mail sshd\[27001\]: Failed password for invalid user passw0rd from 159.89.104.243 port 59845 ssh2
Jul 30 13:39:33 mail sshd\[27240\]: Invalid user 123456 from 159.89.104.243 port 51168
...
2019-07-30 20:47:55
45.160.148.133 attack
Jul 30 08:48:48 lnxded64 sshd[11052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.148.133
2019-07-30 20:19:40
14.177.222.57 attack
445/tcp
[2019-07-30]1pkt
2019-07-30 21:01:52
86.242.39.179 attackspam
Jul 30 13:22:46 mail sshd\[26996\]: Failed password for invalid user papoose from 86.242.39.179 port 58242 ssh2
Jul 30 13:40:21 mail sshd\[27267\]: Invalid user lai from 86.242.39.179 port 36460
...
2019-07-30 20:49:43
209.58.128.172 attackspam
Forum spam
2019-07-30 21:01:15
158.174.122.199 attack
TOR exit node, port scanning
2019-07-30 21:02:34
123.155.11.34 attackbotsspam
23/tcp
[2019-07-30]1pkt
2019-07-30 20:49:15
81.30.208.114 attackbotsspam
30.07.2019 09:16:36 SSH access blocked by firewall
2019-07-30 20:21:11
210.213.125.170 attackspam
445/tcp
[2019-07-30]1pkt
2019-07-30 20:51:27
198.199.107.41 attackspam
Jul 30 14:31:07 icinga sshd[27618]: Failed password for root from 198.199.107.41 port 38536 ssh2
...
2019-07-30 20:40:59
38.240.18.33 attackbotsspam
Jul 30 13:17:11 mail postfix/smtpd\[14064\]: warning: unknown\[38.240.18.33\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 30 13:31:54 mail postfix/smtpd\[14083\]: warning: unknown\[38.240.18.33\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 30 14:15:59 mail postfix/smtpd\[15199\]: warning: unknown\[38.240.18.33\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 30 14:30:55 mail postfix/smtpd\[15616\]: warning: unknown\[38.240.18.33\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-30 20:59:10
37.139.21.75 attackspambots
FTP Brute-Force reported by Fail2Ban
2019-07-30 20:44:38
82.137.208.177 attack
445/tcp
[2019-07-30]1pkt
2019-07-30 20:58:47
213.32.92.57 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-30 20:36:09
129.204.74.15 attackspambots
Jul 30 12:22:34 MK-Soft-VM5 sshd\[18638\]: Invalid user admin from 129.204.74.15 port 43650
Jul 30 12:22:34 MK-Soft-VM5 sshd\[18638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.74.15
Jul 30 12:22:37 MK-Soft-VM5 sshd\[18638\]: Failed password for invalid user admin from 129.204.74.15 port 43650 ssh2
...
2019-07-30 20:55:02

Recently Reported IPs

21.198.104.187 157.46.255.95 7.54.246.229 132.169.27.107
166.41.243.252 167.23.146.163 143.39.151.139 139.255.190.62
247.20.100.224 75.242.97.32 109.102.123.215 176.200.89.239
133.134.253.210 155.112.63.213 167.1.123.46 167.100.97.40
9.18.173.110 137.89.51.64 252.133.182.146 250.132.221.185