Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.55.94.31 attackbotsspam
1597722639 - 08/18/2020 05:50:39 Host: 1.55.94.31/1.55.94.31 Port: 445 TCP Blocked
2020-08-18 17:45:21
1.55.94.104 attack
Unauthorized connection attempt from IP address 1.55.94.104 on Port 445(SMB)
2020-08-01 03:16:16
1.55.94.170 attackspam
1594122901 - 07/07/2020 13:55:01 Host: 1.55.94.170/1.55.94.170 Port: 445 TCP Blocked
2020-07-08 04:02:30
1.55.94.99 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 13-04-2020 18:20:07.
2020-04-14 02:19:52
1.55.94.244 attack
1586145282 - 04/06/2020 05:54:42 Host: 1.55.94.244/1.55.94.244 Port: 445 TCP Blocked
2020-04-06 14:50:16
1.55.94.48 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:21.
2020-03-18 23:56:12
1.55.94.204 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-11 20:13:49
1.55.94.98 attackbots
Email rejected due to spam filtering
2020-02-08 09:44:01
1.55.94.18 attackspambots
Unauthorized connection attempt detected from IP address 1.55.94.18 to port 445
2019-12-31 21:25:49
1.55.94.121 attack
1577112821 - 12/23/2019 15:53:41 Host: 1.55.94.121/1.55.94.121 Port: 445 TCP Blocked
2019-12-24 06:13:56
1.55.94.114 attackspambots
Unauthorised access (Nov 26) SRC=1.55.94.114 LEN=52 TTL=108 ID=18914 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-26 15:44:40
1.55.94.196 attackbots
Autoban   1.55.94.196 AUTH/CONNECT
2019-11-18 22:08:47
1.55.94.137 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 22-10-2019 12:45:21.
2019-10-23 02:00:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.55.94.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.55.94.53.			IN	A

;; AUTHORITY SECTION:
.			556	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 02:55:19 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 53.94.55.1.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 1.55.94.53.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
34.218.236.36 attackspam
As always with amazon web services
2019-06-29 08:06:11
168.0.253.143 attackspambots
SMTP-sasl brute force
...
2019-06-29 08:26:21
192.241.167.200 attackspambots
2019-06-29T01:45:37.467839scmdmz1 sshd\[32692\]: Invalid user sudo1 from 192.241.167.200 port 43726
2019-06-29T01:45:37.470929scmdmz1 sshd\[32692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mktg.zero7eleven.com
2019-06-29T01:45:40.279758scmdmz1 sshd\[32692\]: Failed password for invalid user sudo1 from 192.241.167.200 port 43726 ssh2
...
2019-06-29 08:28:08
216.137.222.201 attackbots
DATE:2019-06-29 01:22:49, IP:216.137.222.201, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis)
2019-06-29 08:33:13
185.49.27.125 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-29 08:29:42
103.12.160.129 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-29 08:40:40
168.228.151.149 attackbotsspam
failed_logins
2019-06-29 08:27:16
37.41.9.79 attackspambots
Jun 29 01:24:35 vmd17057 sshd\[8404\]: Invalid user admin from 37.41.9.79 port 34904
Jun 29 01:24:35 vmd17057 sshd\[8404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.41.9.79
Jun 29 01:24:37 vmd17057 sshd\[8404\]: Failed password for invalid user admin from 37.41.9.79 port 34904 ssh2
...
2019-06-29 08:38:33
118.182.213.21 attackbotsspam
IMAP brute force
...
2019-06-29 08:11:03
179.108.244.175 attackbots
Jun 28 18:25:00 mailman postfix/smtpd[7027]: warning: unknown[179.108.244.175]: SASL PLAIN authentication failed: authentication failure
2019-06-29 08:21:48
199.217.119.233 attackspambots
28.06.2019 23:26:09 Connection to port 8081 blocked by firewall
2019-06-29 07:57:36
121.61.150.148 attackbotsspam
SASL broute force
2019-06-29 08:40:22
188.165.29.110 attack
Automatic report - Web App Attack
2019-06-29 08:16:53
202.84.33.200 attackbotsspam
Jun 29 00:05:16 db sshd\[11145\]: Invalid user zimbra from 202.84.33.200
Jun 29 00:05:16 db sshd\[11145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.84.33.200 
Jun 29 00:05:18 db sshd\[11145\]: Failed password for invalid user zimbra from 202.84.33.200 port 53250 ssh2
Jun 29 00:09:06 db sshd\[11244\]: Invalid user steam from 202.84.33.200
Jun 29 00:09:06 db sshd\[11244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.84.33.200 
...
2019-06-29 08:23:24
156.208.12.25 attackbotsspam
Honeypot attack, port: 23, PTR: host-156.208.25.12-static.tedata.net.
2019-06-29 08:38:57

Recently Reported IPs

1.6.188.146 1.6.44.194 1.63.11.6 1.64.105.144
1.69.178.191 1.65.190.136 1.71.251.16 1.64.47.118
1.62.192.29 1.80.114.237 1.80.174.97 1.80.185.220
1.80.21.73 1.80.242.187 1.80.246.181 1.81.191.71
1.81.194.197 1.80.89.59 1.81.195.133 1.82.193.92