Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.207.20.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.207.20.55.			IN	A

;; AUTHORITY SECTION:
.			494	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010901 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 10 07:10:29 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 55.20.207.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.20.207.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.75.24.68 attackbots
Aug 21 13:59:48 ny01 sshd[7972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.75.24.68
Aug 21 13:59:50 ny01 sshd[7972]: Failed password for invalid user bd from 119.75.24.68 port 46666 ssh2
Aug 21 14:05:00 ny01 sshd[8441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.75.24.68
2019-08-22 04:57:45
113.28.150.73 attackspam
Automatic report - Banned IP Access
2019-08-22 04:56:37
18.188.168.149 attackbots
Aug 21 15:20:34 localhost sshd\[5557\]: Invalid user mcserver from 18.188.168.149 port 42476
Aug 21 15:20:34 localhost sshd\[5557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.188.168.149
Aug 21 15:20:36 localhost sshd\[5557\]: Failed password for invalid user mcserver from 18.188.168.149 port 42476 ssh2
2019-08-22 04:43:50
192.241.220.227 attackspambots
WordPress wp-login brute force :: 192.241.220.227 0.200 BYPASS [22/Aug/2019:00:53:18  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-22 04:58:04
180.179.174.247 attackspam
Aug 21 10:29:40 php2 sshd\[1175\]: Invalid user trial from 180.179.174.247
Aug 21 10:29:40 php2 sshd\[1175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=msmail.mouthshut.com
Aug 21 10:29:41 php2 sshd\[1175\]: Failed password for invalid user trial from 180.179.174.247 port 43586 ssh2
Aug 21 10:36:13 php2 sshd\[1803\]: Invalid user nico from 180.179.174.247
Aug 21 10:36:13 php2 sshd\[1803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=msmail.mouthshut.com
2019-08-22 04:40:44
121.171.117.248 attackbotsspam
Aug 21 08:38:51 plusreed sshd[5690]: Invalid user pbb from 121.171.117.248
...
2019-08-22 04:53:14
186.232.141.154 attackbotsspam
[munged]::443 186.232.141.154 - - [21/Aug/2019:13:36:08 +0200] "POST /[munged]: HTTP/1.1" 200 9039 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.232.141.154 - - [21/Aug/2019:13:36:09 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.232.141.154 - - [21/Aug/2019:13:36:10 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.232.141.154 - - [21/Aug/2019:13:36:12 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.232.141.154 - - [21/Aug/2019:13:36:13 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.232.141.154 - - [21/Aug/20
2019-08-22 04:37:01
129.204.202.89 attackspam
Aug 21 22:18:47 OPSO sshd\[16742\]: Invalid user ubuntu from 129.204.202.89 port 57212
Aug 21 22:18:47 OPSO sshd\[16742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.202.89
Aug 21 22:18:48 OPSO sshd\[16742\]: Failed password for invalid user ubuntu from 129.204.202.89 port 57212 ssh2
Aug 21 22:23:26 OPSO sshd\[17793\]: Invalid user amin from 129.204.202.89 port 50840
Aug 21 22:23:26 OPSO sshd\[17793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.202.89
2019-08-22 04:42:27
131.255.82.160 attackspam
Aug 21 21:01:13 [host] sshd[16824]: Invalid user smtpguard from 131.255.82.160
Aug 21 21:01:13 [host] sshd[16824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.255.82.160
Aug 21 21:01:15 [host] sshd[16824]: Failed password for invalid user smtpguard from 131.255.82.160 port 51876 ssh2
2019-08-22 04:27:02
81.22.45.252 attackbotsspam
08/21/2019-15:29:26.343421 81.22.45.252 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 85
2019-08-22 04:29:41
41.138.89.241 attack
SASL Brute Force
2019-08-22 04:31:51
114.67.68.224 attackspambots
Aug 21 18:47:53 SilenceServices sshd[9761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.68.224
Aug 21 18:47:55 SilenceServices sshd[9761]: Failed password for invalid user audio from 114.67.68.224 port 44186 ssh2
Aug 21 18:50:45 SilenceServices sshd[12280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.68.224
2019-08-22 04:29:19
178.33.233.54 attackspam
vps1:sshd-InvalidUser
2019-08-22 04:44:53
140.143.72.21 attack
Aug 21 21:13:25 mail sshd\[19079\]: Failed password for invalid user mapr from 140.143.72.21 port 49440 ssh2
Aug 21 21:32:04 mail sshd\[19507\]: Invalid user crimson from 140.143.72.21 port 55274
Aug 21 21:32:04 mail sshd\[19507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.72.21
...
2019-08-22 04:33:01
36.156.24.78 attackbotsspam
Aug 21 10:09:58 friendsofhawaii sshd\[32671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.78  user=root
Aug 21 10:10:00 friendsofhawaii sshd\[32671\]: Failed password for root from 36.156.24.78 port 52872 ssh2
Aug 21 10:10:02 friendsofhawaii sshd\[32671\]: Failed password for root from 36.156.24.78 port 52872 ssh2
Aug 21 10:10:04 friendsofhawaii sshd\[32671\]: Failed password for root from 36.156.24.78 port 52872 ssh2
Aug 21 10:10:08 friendsofhawaii sshd\[32711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.78  user=root
2019-08-22 04:19:14

Recently Reported IPs

94.46.28.88 10.220.246.150 13.86.3.205 82.68.8.121
197.182.127.98 25.100.181.53 167.254.175.159 34.51.27.47
82.217.99.94 202.158.114.25 216.147.153.82 192.227.104.146
104.231.98.74 76.69.8.55 95.231.254.99 205.211.193.191
24.37.247.91 39.107.127.177 34.89.118.70 116.142.49.107