Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ho Chi Minh City

Region: Ho Chi Minh

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: The Corporation for Financing & Promoting Technology

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.55.192.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16756
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.55.192.222.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 19 15:44:12 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 222.192.55.1.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.3, trying next server
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 222.192.55.1.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
46.101.149.19 attackspam
Mar 28 10:49:34 firewall sshd[30846]: Invalid user vil from 46.101.149.19
Mar 28 10:49:36 firewall sshd[30846]: Failed password for invalid user vil from 46.101.149.19 port 36531 ssh2
Mar 28 10:56:22 firewall sshd[31188]: Invalid user zcv from 46.101.149.19
...
2020-03-29 00:00:12
182.61.10.28 attackbots
B: ssh repeated attack for invalid user
2020-03-28 23:29:52
190.215.112.122 attackbotsspam
(sshd) Failed SSH login from 190.215.112.122 (CL/Chile/mail.calimport.cl): 10 in the last 3600 secs
2020-03-28 23:50:50
157.245.42.253 attackspam
157.245.42.253 - - [28/Mar/2020:15:42:51 +0300] "POST /wp-login.php HTTP/1.1" 200 2790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-28 23:51:58
188.121.104.254 attackspam
DATE:2020-03-28 13:38:40, IP:188.121.104.254, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-03-29 00:03:03
162.243.130.170 attackbotsspam
scan z
2020-03-28 23:15:54
36.71.220.174 attackbotsspam
1585399416 - 03/28/2020 13:43:36 Host: 36.71.220.174/36.71.220.174 Port: 445 TCP Blocked
2020-03-28 23:12:43
106.13.6.116 attackspam
Mar 28 13:36:47 vps58358 sshd\[25777\]: Invalid user vhc from 106.13.6.116Mar 28 13:36:49 vps58358 sshd\[25777\]: Failed password for invalid user vhc from 106.13.6.116 port 53102 ssh2Mar 28 13:39:41 vps58358 sshd\[25941\]: Invalid user rohina from 106.13.6.116Mar 28 13:39:43 vps58358 sshd\[25941\]: Failed password for invalid user rohina from 106.13.6.116 port 43482 ssh2Mar 28 13:42:50 vps58358 sshd\[26044\]: Invalid user hiroshi from 106.13.6.116Mar 28 13:42:52 vps58358 sshd\[26044\]: Failed password for invalid user hiroshi from 106.13.6.116 port 46634 ssh2
...
2020-03-28 23:49:44
92.240.238.53 attackbots
SSH Brute Force
2020-03-29 00:03:28
111.67.193.92 attack
Mar 28 14:00:02 plex sshd[26607]: Invalid user juj from 111.67.193.92 port 42652
2020-03-28 23:14:09
125.34.105.238 attack
Lines containing failures of 125.34.105.238
Mar 28 13:21:42 shared04 sshd[1728]: Invalid user admin from 125.34.105.238 port 59537
Mar 28 13:21:42 shared04 sshd[1728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.34.105.238
Mar 28 13:21:44 shared04 sshd[1728]: Failed password for invalid user admin from 125.34.105.238 port 59537 ssh2
Mar 28 13:21:45 shared04 sshd[1728]: Connection closed by invalid user admin 125.34.105.238 port 59537 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.34.105.238
2020-03-28 23:49:23
222.186.30.248 attackbots
Mar 28 17:41:08 server2 sshd\[13320\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:41:09 server2 sshd\[13325\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:41:09 server2 sshd\[13322\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:45:26 server2 sshd\[13645\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:45:26 server2 sshd\[13646\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Mar 28 17:45:28 server2 sshd\[13649\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
2020-03-28 23:46:56
140.238.200.230 attackbotsspam
20 attempts against mh-ssh on cloud
2020-03-28 23:54:54
60.251.136.161 attackbotsspam
Mar 28 16:02:52 meumeu sshd[26899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.136.161 
Mar 28 16:02:55 meumeu sshd[26899]: Failed password for invalid user cacti from 60.251.136.161 port 39244 ssh2
Mar 28 16:04:51 meumeu sshd[27084]: Failed password for root from 60.251.136.161 port 53344 ssh2
...
2020-03-28 23:22:20
176.40.248.140 attackspambots
Lines containing failures of 176.40.248.140 (max 1000)
Mar 28 13:21:41 HOSTNAME sshd[2718]: Address 176.40.248.140 maps to host-176-40-248-140.reveeclipse.superonline.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Mar 28 13:21:41 HOSTNAME sshd[2718]: User r.r from 176.40.248.140 not allowed because not listed in AllowUsers
Mar 28 13:21:41 HOSTNAME sshd[2718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.40.248.140  user=r.r
Mar 28 13:21:43 HOSTNAME sshd[2718]: Failed password for invalid user r.r from 176.40.248.140 port 21146 ssh2
Mar 28 13:21:43 HOSTNAME sshd[2718]: Connection closed by 176.40.248.140 port 21146 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.40.248.140
2020-03-28 23:43:47

Recently Reported IPs

84.236.67.102 111.230.180.237 111.231.195.206 107.170.239.125
202.166.207.211 37.191.154.115 111.75.54.31 95.218.29.249
90.127.221.232 107.180.68.170 83.212.74.233 119.23.55.235
52.224.15.61 139.217.198.80 45.120.87.62 177.103.93.79
142.93.63.129 92.246.76.140 84.201.154.125 84.201.134.45