Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.56.145.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.56.145.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 10:44:05 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 28.145.56.6.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 6.56.145.28.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.75.153.43 attackbots
Oct 26 07:09:01 MK-Soft-Root2 sshd[20401]: Failed password for root from 106.75.153.43 port 60728 ssh2
...
2019-10-26 16:14:47
77.42.127.252 attack
port 23 attempt blocked
2019-10-26 16:07:51
81.165.96.22 attackspam
DATE:2019-10-26 05:48:51, IP:81.165.96.22, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-26 16:03:46
106.12.212.100 attack
Oct 26 03:48:22 hcbbdb sshd\[6913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.100  user=root
Oct 26 03:48:24 hcbbdb sshd\[6913\]: Failed password for root from 106.12.212.100 port 53356 ssh2
Oct 26 03:48:25 hcbbdb sshd\[6923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.100  user=root
Oct 26 03:48:27 hcbbdb sshd\[6923\]: Failed password for root from 106.12.212.100 port 53440 ssh2
Oct 26 03:48:30 hcbbdb sshd\[6935\]: Invalid user pi from 106.12.212.100
2019-10-26 16:22:11
81.150.71.181 attackbots
88/tcp
[2019-10-26]1pkt
2019-10-26 15:49:40
51.89.57.123 attackbots
2019-10-26T04:51:21.717639abusebot-5.cloudsearch.cf sshd\[12975\]: Invalid user starcraft from 51.89.57.123 port 46994
2019-10-26 16:19:48
177.34.184.62 attack
Honeypot attack, port: 23, PTR: b122b83e.virtua.com.br.
2019-10-26 16:01:06
90.207.37.198 attackspambots
8080/tcp
[2019-10-26]1pkt
2019-10-26 15:54:39
49.234.25.11 attackbotsspam
Automatic report - Banned IP Access
2019-10-26 15:56:29
218.94.136.90 attackspambots
Oct 26 09:38:36 dev0-dcde-rnet sshd[8119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
Oct 26 09:38:38 dev0-dcde-rnet sshd[8119]: Failed password for invalid user admin from 218.94.136.90 port 1345 ssh2
Oct 26 09:42:59 dev0-dcde-rnet sshd[8126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
2019-10-26 16:21:15
145.239.196.2 attackbotsspam
Oct 25 23:40:33 keyhelp sshd[27578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.196.2  user=r.r
Oct 25 23:40:36 keyhelp sshd[27578]: Failed password for r.r from 145.239.196.2 port 40840 ssh2
Oct 25 23:40:36 keyhelp sshd[27578]: Received disconnect from 145.239.196.2 port 40840:11: Bye Bye [preauth]
Oct 25 23:40:36 keyhelp sshd[27578]: Disconnected from 145.239.196.2 port 40840 [preauth]
Oct 25 23:46:24 keyhelp sshd[28747]: Invalid user cyrus from 145.239.196.2
Oct 25 23:46:24 keyhelp sshd[28747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.196.2
Oct 25 23:46:26 keyhelp sshd[28747]: Failed password for invalid user cyrus from 145.239.196.2 port 41670 ssh2
Oct 25 23:46:26 keyhelp sshd[28747]: Received disconnect from 145.239.196.2 port 41670:11: Bye Bye [preauth]
Oct 25 23:46:26 keyhelp sshd[28747]: Disconnected from 145.239.196.2 port 41670 [preauth]


........
---------------------------------------------
2019-10-26 16:14:26
5.141.174.149 attack
Chat Spam
2019-10-26 16:02:49
165.22.130.168 attackspambots
Oct 21 06:49:43 nirvana postfix/smtpd[14164]: connect from unknown[165.22.130.168]
Oct 21 06:49:44 nirvana postfix/smtpd[14164]: warning: unknown[165.22.130.168]: SASL LOGIN authentication failed: authentication failure
Oct 21 06:49:44 nirvana postfix/smtpd[14164]: disconnect from unknown[165.22.130.168]
Oct 21 06:55:21 nirvana postfix/smtpd[21609]: connect from unknown[165.22.130.168]
Oct 21 06:55:22 nirvana postfix/smtpd[21609]: warning: unknown[165.22.130.168]: SASL LOGIN authentication failed: authentication failure
Oct 21 06:55:22 nirvana postfix/smtpd[21609]: disconnect from unknown[165.22.130.168]
Oct 21 06:56:35 nirvana postfix/smtpd[21609]: connect from unknown[165.22.130.168]
Oct 21 06:56:36 nirvana postfix/smtpd[21609]: warning: unknown[165.22.130.168]: SASL LOGIN authentication failed: authentication failure
Oct 21 06:56:36 nirvana postfix/smtpd[21609]: disconnect from unknown[165.22.130.168]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.22
2019-10-26 15:48:43
14.231.195.174 attack
445/tcp 445/tcp
[2019-10-26]2pkt
2019-10-26 15:54:08
190.196.60.203 attackspam
Oct 26 07:48:13 game-panel sshd[32668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.196.60.203
Oct 26 07:48:15 game-panel sshd[32668]: Failed password for invalid user Law123 from 190.196.60.203 port 47141 ssh2
Oct 26 07:53:05 game-panel sshd[334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.196.60.203
2019-10-26 16:08:34

Recently Reported IPs

20.72.232.214 67.60.182.100 75.226.207.5 95.157.206.238
101.36.47.9 223.232.186.117 235.247.81.55 160.141.23.34
220.176.218.203 60.143.246.218 137.29.212.120 3.68.142.208
251.255.217.135 49.110.98.45 118.234.95.165 61.110.56.133
211.0.94.173 96.2.147.62 123.163.246.2 134.154.29.141