Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: FPT Broadband Service

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Unauthorized connection attempt from IP address 1.55.94.104 on Port 445(SMB)
2020-08-01 03:16:16
Comments on same subnet:
IP Type Details Datetime
1.55.94.31 attackbotsspam
1597722639 - 08/18/2020 05:50:39 Host: 1.55.94.31/1.55.94.31 Port: 445 TCP Blocked
2020-08-18 17:45:21
1.55.94.170 attackspam
1594122901 - 07/07/2020 13:55:01 Host: 1.55.94.170/1.55.94.170 Port: 445 TCP Blocked
2020-07-08 04:02:30
1.55.94.99 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 13-04-2020 18:20:07.
2020-04-14 02:19:52
1.55.94.244 attack
1586145282 - 04/06/2020 05:54:42 Host: 1.55.94.244/1.55.94.244 Port: 445 TCP Blocked
2020-04-06 14:50:16
1.55.94.48 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:21.
2020-03-18 23:56:12
1.55.94.204 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-11 20:13:49
1.55.94.98 attackbots
Email rejected due to spam filtering
2020-02-08 09:44:01
1.55.94.18 attackspambots
Unauthorized connection attempt detected from IP address 1.55.94.18 to port 445
2019-12-31 21:25:49
1.55.94.121 attack
1577112821 - 12/23/2019 15:53:41 Host: 1.55.94.121/1.55.94.121 Port: 445 TCP Blocked
2019-12-24 06:13:56
1.55.94.114 attackspambots
Unauthorised access (Nov 26) SRC=1.55.94.114 LEN=52 TTL=108 ID=18914 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-26 15:44:40
1.55.94.196 attackbots
Autoban   1.55.94.196 AUTH/CONNECT
2019-11-18 22:08:47
1.55.94.137 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 22-10-2019 12:45:21.
2019-10-23 02:00:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.55.94.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.55.94.104.			IN	A

;; AUTHORITY SECTION:
.			369	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020073100 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 01 03:16:11 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 104.94.55.1.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 104.94.55.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
180.183.244.160 attack
Invalid user admin from 180.183.244.160 port 46201
2019-08-23 23:39:39
144.217.255.89 attackspambots
Invalid user john from 144.217.255.89 port 56500
2019-08-23 23:51:26
59.25.197.162 attack
Invalid user ftpadmin from 59.25.197.162 port 46186
2019-08-23 22:56:43
54.222.206.75 attack
Invalid user wang from 54.222.206.75 port 55270
2019-08-23 22:58:00
200.29.67.82 attackspam
Aug 23 03:28:37 lcprod sshd\[31157\]: Invalid user ts3 from 200.29.67.82
Aug 23 03:28:37 lcprod sshd\[31157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=enternet.netglobalis.net
Aug 23 03:28:38 lcprod sshd\[31157\]: Failed password for invalid user ts3 from 200.29.67.82 port 36829 ssh2
Aug 23 03:33:30 lcprod sshd\[31604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=enternet.netglobalis.net  user=root
Aug 23 03:33:32 lcprod sshd\[31604\]: Failed password for root from 200.29.67.82 port 59357 ssh2
2019-08-23 23:27:38
1.30.216.39 attackbots
Invalid user admin from 1.30.216.39 port 60699
2019-08-23 23:17:59
177.125.47.61 attackspambots
Invalid user admin from 177.125.47.61 port 58859
2019-08-23 23:43:02
58.250.174.73 attackspambots
Invalid user user from 58.250.174.73 port 45201
2019-08-23 22:57:25
178.127.109.118 attackbots
Invalid user admin from 178.127.109.118 port 44030
2019-08-23 23:41:10
14.242.31.199 attack
Invalid user admin from 14.242.31.199 port 51300
2019-08-23 23:13:22
167.71.56.222 attackspam
Invalid user john from 167.71.56.222 port 35388
2019-08-23 23:45:30
68.183.83.164 attackbotsspam
Invalid user fake from 68.183.83.164 port 47646
2019-08-23 22:53:43
151.177.130.232 attackbots
Invalid user pi from 151.177.130.232 port 55150
2019-08-23 23:49:14
45.12.220.250 attackbotsspam
Invalid user toor from 45.12.220.250 port 48863
2019-08-23 23:04:37
37.187.120.121 attackbotsspam
Invalid user minecraft from 37.187.120.121 port 48226
2019-08-23 23:08:55

Recently Reported IPs

46.239.28.111 49.15.211.218 177.17.196.4 167.61.118.0
116.96.76.186 117.203.245.83 89.216.105.248 124.123.32.93
39.33.63.146 2.45.79.46 54.218.89.196 219.143.32.133
51.197.237.21 42.103.17.53 191.34.130.62 28.7.80.148
185.152.66.231 197.255.20.37 97.74.222.134 77.222.24.1