Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.2.213.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.2.213.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 17:12:15 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 45.213.2.56.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 56.2.213.45.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.12 attackbots
Jan 14 01:40:11 server2 sshd\[21442\]: User root from 222.186.30.12 not allowed because not listed in AllowUsers
Jan 14 01:40:11 server2 sshd\[21440\]: User root from 222.186.30.12 not allowed because not listed in AllowUsers
Jan 14 01:40:11 server2 sshd\[21444\]: User root from 222.186.30.12 not allowed because not listed in AllowUsers
Jan 14 01:40:11 server2 sshd\[21447\]: User root from 222.186.30.12 not allowed because not listed in AllowUsers
Jan 14 01:40:11 server2 sshd\[21446\]: User root from 222.186.30.12 not allowed because not listed in AllowUsers
Jan 14 01:40:40 server2 sshd\[21463\]: User root from 222.186.30.12 not allowed because not listed in AllowUsers
2020-01-14 07:40:45
36.230.66.148 attackspam
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: r.r)
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: admin)
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: 12345)
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: guest)
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: 123456)
Jan 13 21:17:14 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: 1234)
Jan 13 21:17:14 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.23........
------------------------------
2020-01-14 07:40:26
200.219.152.41 attackbots
IMAP
2020-01-14 07:35:50
150.109.16.122 attackbots
Unauthorized connection attempt detected from IP address 150.109.16.122 to port 989 [J]
2020-01-14 07:10:21
178.128.23.108 attack
Website hacking attempt: Improper php file access [php file]
2020-01-14 07:34:30
122.97.128.130 attack
Unauthorized connection attempt detected from IP address 122.97.128.130 to port 23 [J]
2020-01-14 07:21:37
167.114.113.141 attack
Unauthorized connection attempt detected from IP address 167.114.113.141 to port 2220 [J]
2020-01-14 07:41:01
185.176.27.254 attack
01/13/2020-18:07:28.977114 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-14 07:13:43
222.186.173.154 attackbotsspam
Jan 14 00:02:10 markkoudstaal sshd[9569]: Failed password for root from 222.186.173.154 port 44284 ssh2
Jan 14 00:02:13 markkoudstaal sshd[9569]: Failed password for root from 222.186.173.154 port 44284 ssh2
Jan 14 00:02:16 markkoudstaal sshd[9569]: Failed password for root from 222.186.173.154 port 44284 ssh2
Jan 14 00:02:20 markkoudstaal sshd[9569]: Failed password for root from 222.186.173.154 port 44284 ssh2
2020-01-14 07:12:40
2.139.209.78 attack
Unauthorized connection attempt detected from IP address 2.139.209.78 to port 2220 [J]
2020-01-14 07:17:28
193.112.32.238 attackspambots
"SSH brute force auth login attempt."
2020-01-14 07:09:26
103.6.198.77 attackspam
WordPress wp-login brute force :: 103.6.198.77 0.152 - [13/Jan/2020:23:04:35  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-01-14 07:18:31
222.186.175.161 attackbots
Jan 14 00:02:26 ns3042688 sshd\[11651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
Jan 14 00:02:28 ns3042688 sshd\[11651\]: Failed password for root from 222.186.175.161 port 62398 ssh2
Jan 14 00:02:44 ns3042688 sshd\[11774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
Jan 14 00:02:46 ns3042688 sshd\[11774\]: Failed password for root from 222.186.175.161 port 19526 ssh2
Jan 14 00:03:07 ns3042688 sshd\[11861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
...
2020-01-14 07:05:26
189.239.90.226 attackspambots
1578950587 - 01/13/2020 22:23:07 Host: 189.239.90.226/189.239.90.226 Port: 445 TCP Blocked
2020-01-14 07:07:02
121.127.15.91 attack
2020-01-13T21:21:34.179635abusebot.cloudsearch.cf sshd[20451]: Invalid user support from 121.127.15.91 port 55855
2020-01-13T21:21:34.185295abusebot.cloudsearch.cf sshd[20451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.127.15.91
2020-01-13T21:21:34.179635abusebot.cloudsearch.cf sshd[20451]: Invalid user support from 121.127.15.91 port 55855
2020-01-13T21:21:36.618778abusebot.cloudsearch.cf sshd[20451]: Failed password for invalid user support from 121.127.15.91 port 55855 ssh2
2020-01-13T21:22:36.697404abusebot.cloudsearch.cf sshd[20505]: Invalid user butter from 121.127.15.91 port 60856
2020-01-13T21:22:36.704287abusebot.cloudsearch.cf sshd[20505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.127.15.91
2020-01-13T21:22:36.697404abusebot.cloudsearch.cf sshd[20505]: Invalid user butter from 121.127.15.91 port 60856
2020-01-13T21:22:38.314942abusebot.cloudsearch.cf sshd[20505]: Failed passwor
...
2020-01-14 07:25:40

Recently Reported IPs

96.193.114.89 123.1.62.171 177.252.46.82 196.5.28.224
252.50.124.211 193.15.246.177 85.85.205.105 255.155.106.5
127.2.241.34 150.186.148.20 233.50.231.180 145.127.97.10
103.241.59.50 232.93.243.32 173.129.169.252 132.83.154.43
211.134.121.174 201.79.209.206 19.166.229.143 179.15.197.115