Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.220.50.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4954
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.220.50.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:14:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 52.50.220.56.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 56.220.50.52.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.229.109.26 attack
22/tcp 22/tcp 22/tcp...
[2020-02-28/04-18]20pkt,1pt.(tcp)
2020-04-19 02:41:32
192.144.232.101 attackbotsspam
Apr 18 18:39:53 powerpi2 sshd[13150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.232.101
Apr 18 18:39:53 powerpi2 sshd[13150]: Invalid user test2 from 192.144.232.101 port 34630
Apr 18 18:39:55 powerpi2 sshd[13150]: Failed password for invalid user test2 from 192.144.232.101 port 34630 ssh2
...
2020-04-19 02:56:36
111.229.121.142 attackbots
Apr 18 15:53:11 scw-6657dc sshd[5253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.121.142
Apr 18 15:53:11 scw-6657dc sshd[5253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.121.142
Apr 18 15:53:13 scw-6657dc sshd[5253]: Failed password for invalid user oracle from 111.229.121.142 port 44540 ssh2
...
2020-04-19 02:41:15
103.242.56.189 attackbotsspam
Apr 18 12:27:11 ws26vmsma01 sshd[127517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.56.189
Apr 18 12:27:13 ws26vmsma01 sshd[127517]: Failed password for invalid user test from 103.242.56.189 port 47008 ssh2
...
2020-04-19 02:45:34
14.186.23.241 attack
Invalid user admin from 14.186.23.241 port 43664
2020-04-19 02:53:56
178.62.113.55 attackspam
Apr 18 20:56:40 raspberrypi sshd[8972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.113.55
2020-04-19 03:01:32
187.189.226.22 attackbotsspam
Invalid user admin from 187.189.226.22 port 58315
2020-04-19 02:58:14
154.183.208.0 attackspam
Invalid user admin from 154.183.208.0 port 37097
2020-04-19 03:05:13
65.34.120.176 attackbotsspam
(sshd) Failed SSH login from 65.34.120.176 (US/United States/-): 5 in the last 3600 secs
2020-04-19 02:48:48
180.215.204.159 attackbots
Invalid user firefart from 180.215.204.159 port 42692
2020-04-19 03:00:17
59.92.108.183 attackbotsspam
Invalid user admin from 59.92.108.183 port 51971
2020-04-19 03:20:24
59.120.1.133 attackbots
Apr 18 18:44:18 marvibiene sshd[39730]: Invalid user testftp from 59.120.1.133 port 37775
Apr 18 18:44:18 marvibiene sshd[39730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.1.133
Apr 18 18:44:18 marvibiene sshd[39730]: Invalid user testftp from 59.120.1.133 port 37775
Apr 18 18:44:20 marvibiene sshd[39730]: Failed password for invalid user testftp from 59.120.1.133 port 37775 ssh2
...
2020-04-19 03:20:07
93.149.12.2 attack
Apr 18 18:19:23 v22019038103785759 sshd\[3138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.149.12.2  user=root
Apr 18 18:19:25 v22019038103785759 sshd\[3138\]: Failed password for root from 93.149.12.2 port 58278 ssh2
Apr 18 18:29:20 v22019038103785759 sshd\[3730\]: Invalid user kg from 93.149.12.2 port 48982
Apr 18 18:29:20 v22019038103785759 sshd\[3730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.149.12.2
Apr 18 18:29:22 v22019038103785759 sshd\[3730\]: Failed password for invalid user kg from 93.149.12.2 port 48982 ssh2
...
2020-04-19 02:46:44
14.186.32.5 attackspam
Invalid user admin from 14.186.32.5 port 52139
2020-04-19 02:53:38
165.22.61.82 attackbots
$f2bV_matches
2020-04-19 03:03:16

Recently Reported IPs

4.158.169.169 27.243.205.176 157.171.204.215 55.182.231.54
38.68.184.96 253.157.128.143 39.37.253.169 149.223.222.175
237.104.13.75 8.25.47.136 69.234.182.160 218.220.93.167
19.114.131.2 5.128.116.230 55.3.232.187 238.170.200.170
244.83.92.237 33.120.85.148 82.156.170.50 211.39.41.43