Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.22.48.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.22.48.2.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123001 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 03:50:45 CST 2021
;; MSG SIZE  rcvd: 103
Host info
Host 2.48.22.56.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.48.22.56.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.224.105.120 attackbotsspam
Time:     Mon Mar 16 05:56:14 2020 -0300
IP:       45.224.105.120 (AR/Argentina/-)
Failures: 20 (WordPressBruteForcePOST)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-03-16 20:46:46
61.55.135.108 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-16 20:29:03
170.210.83.82 attack
Mar 16 06:49:37 localhost sshd\[31647\]: Invalid user tc from 170.210.83.82 port 53604
Mar 16 06:49:37 localhost sshd\[31647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.83.82
Mar 16 06:49:39 localhost sshd\[31647\]: Failed password for invalid user tc from 170.210.83.82 port 53604 ssh2
2020-03-16 20:52:56
35.197.133.238 attackbots
Invalid user user from 35.197.133.238 port 41277
2020-03-16 21:01:14
195.250.240.2 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-16 20:37:47
86.34.36.181 attackspam
Honeypot attack, port: 81, PTR: adsl86-34-36-181.romtelecom.net.
2020-03-16 20:35:08
190.156.231.245 attackspambots
Mar 16 09:47:26 vpn01 sshd[4322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.156.231.245
Mar 16 09:47:28 vpn01 sshd[4322]: Failed password for invalid user bk from 190.156.231.245 port 52551 ssh2
...
2020-03-16 21:03:10
114.125.94.5 attack
Hacking my game account
2020-03-16 20:34:05
89.248.168.220 attackspam
Unauthorized connection attempt detected from IP address 89.248.168.220 to port 2404 [T]
2020-03-16 20:47:09
125.113.72.45 attackbotsspam
firewall-block, port(s): 23/tcp
2020-03-16 20:39:32
46.159.109.65 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-16 20:48:53
198.199.120.42 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-03-16 21:01:51
183.89.214.123 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-16 20:59:18
71.244.113.66 attack
*Port Scan* detected from 71.244.113.66 (US/United States/static-71-244-113-66.albyny.fios.verizon.net). 4 hits in the last 160 seconds
2020-03-16 20:22:49
115.79.203.22 attackspambots
1584335402 - 03/16/2020 06:10:02 Host: 115.79.203.22/115.79.203.22 Port: 445 TCP Blocked
2020-03-16 20:40:31

Recently Reported IPs

255.51.202.225 161.125.245.207 85.237.176.124 47.43.26.141
78.16.234.10 195.243.210.178 210.102.219.62 54.107.58.212
61.233.188.182 243.240.255.209 218.101.73.54 65.99.233.90
56.1.39.19 187.169.58.198 45.57.11.156 144.30.171.43
142.42.117.124 106.104.193.180 178.214.174.250 147.72.125.247