Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lucknow

Region: Uttar Pradesh

Country: India

Internet Service Provider: AirTel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 122.163.140.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;122.163.140.55.			IN	A

;; Query time: 4 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:00:06 CST 2021
;; MSG SIZE  rcvd: 43

'
Host info
55.140.163.122.in-addr.arpa domain name pointer abts-north-dynamic-055.140.163.122.airtelbroadband.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.140.163.122.in-addr.arpa	name = abts-north-dynamic-055.140.163.122.airtelbroadband.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.22.92.182 attackspam
Jul  5 07:55:52 aragorn sshd\[32515\]: Invalid user admin from 165.22.92.182\
Jul  5 07:55:53 aragorn sshd\[32517\]: Invalid user admin from 165.22.92.182\
Jul  5 07:55:54 aragorn sshd\[32519\]: Invalid user user from 165.22.92.182\
Jul  5 07:55:55 aragorn sshd\[32521\]: Invalid user ubnt from 165.22.92.182\
2019-07-05 21:15:45
216.218.206.112 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(07051145)
2019-07-05 21:19:34
35.204.143.164 attackspam
GET /wp-login.php HTTP/1.1 403 292 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-07-05 21:11:24
35.240.169.149 attack
Scanning and Vuln Attempts
2019-07-05 21:02:12
104.248.80.78 attackbotsspam
Jul  5 09:58:39 fr01 sshd[5354]: Invalid user beavis from 104.248.80.78
Jul  5 09:58:39 fr01 sshd[5354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78
Jul  5 09:58:39 fr01 sshd[5354]: Invalid user beavis from 104.248.80.78
Jul  5 09:58:42 fr01 sshd[5354]: Failed password for invalid user beavis from 104.248.80.78 port 41242 ssh2
...
2019-07-05 20:33:44
27.79.175.5 attackbots
Scanning and Vuln Attempts
2019-07-05 21:22:47
209.17.96.66 attack
Port scan: Attack repeated for 24 hours
2019-07-05 20:30:45
144.217.85.183 attackbotsspam
2019-07-05T11:52:40.862429cavecanem sshd[16021]: Invalid user unreal from 144.217.85.183 port 52690
2019-07-05T11:52:40.864918cavecanem sshd[16021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.85.183
2019-07-05T11:52:40.862429cavecanem sshd[16021]: Invalid user unreal from 144.217.85.183 port 52690
2019-07-05T11:52:42.541338cavecanem sshd[16021]: Failed password for invalid user unreal from 144.217.85.183 port 52690 ssh2
2019-07-05T11:55:25.006404cavecanem sshd[16751]: Invalid user ghani from 144.217.85.183 port 37253
2019-07-05T11:55:25.011700cavecanem sshd[16751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.85.183
2019-07-05T11:55:25.006404cavecanem sshd[16751]: Invalid user ghani from 144.217.85.183 port 37253
2019-07-05T11:55:26.672514cavecanem sshd[16751]: Failed password for invalid user ghani from 144.217.85.183 port 37253 ssh2
2019-07-05T11:58:15.458070cavecanem sshd[17563]: 
...
2019-07-05 20:44:41
54.38.188.34 attackspam
Jul  5 09:54:51 host sshd\[48834\]: Failed password for mysql from 54.38.188.34 port 35770 ssh2
Jul  5 09:58:46 host sshd\[50803\]: Invalid user zhuan from 54.38.188.34 port 44550
...
2019-07-05 20:31:02
153.36.236.242 attackspam
Jul  5 14:27:09 ubuntu-2gb-nbg1-dc3-1 sshd[32203]: Failed password for root from 153.36.236.242 port 50439 ssh2
Jul  5 14:27:15 ubuntu-2gb-nbg1-dc3-1 sshd[32203]: error: maximum authentication attempts exceeded for root from 153.36.236.242 port 50439 ssh2 [preauth]
...
2019-07-05 20:36:25
156.217.76.195 attack
Jul  5 09:57:38 andromeda sshd\[38104\]: Invalid user admin from 156.217.76.195 port 55769
Jul  5 09:57:38 andromeda sshd\[38104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.217.76.195
Jul  5 09:57:40 andromeda sshd\[38104\]: Failed password for invalid user admin from 156.217.76.195 port 55769 ssh2
2019-07-05 21:06:31
35.204.115.182 attackspam
Scanning and Vuln Attempts
2019-07-05 21:14:52
117.253.51.123 attackspambots
Jul  5 10:57:09 srv-4 sshd\[20039\]: Invalid user admin from 117.253.51.123
Jul  5 10:57:09 srv-4 sshd\[20039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.253.51.123
Jul  5 10:57:11 srv-4 sshd\[20039\]: Failed password for invalid user admin from 117.253.51.123 port 33587 ssh2
...
2019-07-05 21:25:21
185.176.27.90 attack
05.07.2019 12:26:27 Connection to port 50300 blocked by firewall
2019-07-05 20:41:11
42.159.90.6 attackbotsspam
Scanning and Vuln Attempts
2019-07-05 20:55:30

Recently Reported IPs

185.245.96.199 151.101.114.2 182.70.178.202 190.56.250.150
183.87.100.26 192.173.163.233 46.93.78.169 45.139.186.253
65.0.151.33 118.112.189.99 77.249.160.143 37.201.168.178
2600:387:1:803::ad 50.105.96.48 91.39.255.93 167.71.111.118
110.37.205.38 213.97.158.20 31.210.20.234 58.56.182.54