Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.185.55.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.185.55.42.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 02:14:40 CST 2022
;; MSG SIZE  rcvd: 106
Host info
42.55.185.122.in-addr.arpa domain name pointer nsg-corporate-42.55.185.122.airtel.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.55.185.122.in-addr.arpa	name = nsg-corporate-42.55.185.122.airtel.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.87.213 attackspambots
Nov 23 15:16:31 mail sshd[31705]: Invalid user znc-admin from 49.235.87.213
Nov 23 15:16:31 mail sshd[31705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.87.213
Nov 23 15:16:31 mail sshd[31705]: Invalid user znc-admin from 49.235.87.213
Nov 23 15:16:33 mail sshd[31705]: Failed password for invalid user znc-admin from 49.235.87.213 port 50298 ssh2
Nov 23 15:26:23 mail sshd[14633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.87.213  user=daemon
Nov 23 15:26:24 mail sshd[14633]: Failed password for daemon from 49.235.87.213 port 38316 ssh2
...
2019-11-24 00:08:40
192.3.130.170 attackbots
Nov 23 14:22:33 web8 sshd\[638\]: Invalid user froberg from 192.3.130.170
Nov 23 14:22:33 web8 sshd\[638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.130.170
Nov 23 14:22:35 web8 sshd\[638\]: Failed password for invalid user froberg from 192.3.130.170 port 33696 ssh2
Nov 23 14:26:54 web8 sshd\[3071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.130.170  user=root
Nov 23 14:26:55 web8 sshd\[3071\]: Failed password for root from 192.3.130.170 port 42196 ssh2
2019-11-23 23:51:05
106.245.255.19 attack
2019-11-23T15:30:27.948223abusebot-6.cloudsearch.cf sshd\[12262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.255.19  user=root
2019-11-23 23:50:50
50.64.152.76 attackspam
SSH bruteforce
2019-11-24 00:16:52
185.52.2.165 attackbots
185.52.2.165 - - \[23/Nov/2019:14:26:26 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
185.52.2.165 - - \[23/Nov/2019:14:26:27 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-24 00:05:31
87.236.20.13 attackspam
xmlrpc attack
2019-11-24 00:12:39
222.186.190.2 attack
Nov 23 15:32:57 venus sshd\[1022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Nov 23 15:32:59 venus sshd\[1022\]: Failed password for root from 222.186.190.2 port 2966 ssh2
Nov 23 15:33:02 venus sshd\[1022\]: Failed password for root from 222.186.190.2 port 2966 ssh2
...
2019-11-23 23:36:38
202.129.29.135 attack
Nov 23 15:59:20 vmanager6029 sshd\[17030\]: Invalid user krystywa from 202.129.29.135 port 54325
Nov 23 15:59:20 vmanager6029 sshd\[17030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.29.135
Nov 23 15:59:22 vmanager6029 sshd\[17030\]: Failed password for invalid user krystywa from 202.129.29.135 port 54325 ssh2
2019-11-23 23:41:14
137.74.25.247 attackbots
Nov 23 17:40:14 server sshd\[9457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247  user=root
Nov 23 17:40:15 server sshd\[9457\]: Failed password for root from 137.74.25.247 port 58574 ssh2
Nov 23 18:13:55 server sshd\[17829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247  user=root
Nov 23 18:13:57 server sshd\[17829\]: Failed password for root from 137.74.25.247 port 58604 ssh2
Nov 23 18:17:23 server sshd\[18843\]: Invalid user dbtest from 137.74.25.247
...
2019-11-23 23:43:58
94.191.2.228 attack
Nov 23 16:28:15 vmanager6029 sshd\[17587\]: Invalid user chesal from 94.191.2.228 port 40124
Nov 23 16:28:15 vmanager6029 sshd\[17587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.2.228
Nov 23 16:28:17 vmanager6029 sshd\[17587\]: Failed password for invalid user chesal from 94.191.2.228 port 40124 ssh2
2019-11-23 23:49:52
78.26.52.16 attackspam
Nov 23 14:38:11 icinga sshd[17272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.26.52.16 
Nov 23 14:38:13 icinga sshd[17272]: Failed password for invalid user enquiry from 78.26.52.16 port 47865 ssh2
Nov 23 15:26:59 icinga sshd[63069]: Failed password for root from 78.26.52.16 port 57891 ssh2
...
2019-11-23 23:50:12
222.180.162.8 attack
Nov 23 17:46:56 server sshd\[17251\]: Invalid user apache from 222.180.162.8 port 57985
Nov 23 17:46:56 server sshd\[17251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.180.162.8
Nov 23 17:46:58 server sshd\[17251\]: Failed password for invalid user apache from 222.180.162.8 port 57985 ssh2
Nov 23 17:50:41 server sshd\[20777\]: Invalid user uninett from 222.180.162.8 port 56309
Nov 23 17:50:41 server sshd\[20777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.180.162.8
2019-11-23 23:54:02
134.209.88.77 attackspam
Telnet Server BruteForce Attack
2019-11-23 23:53:19
157.55.39.193 attackspambots
Automatic report - Banned IP Access
2019-11-24 00:14:56
107.170.235.19 attack
Nov 23 16:51:42 eventyay sshd[19242]: Failed password for games from 107.170.235.19 port 59590 ssh2
Nov 23 16:55:39 eventyay sshd[19307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.235.19
Nov 23 16:55:41 eventyay sshd[19307]: Failed password for invalid user Leena from 107.170.235.19 port 39254 ssh2
...
2019-11-24 00:08:20

Recently Reported IPs

122.185.53.163 122.185.83.20 122.186.1.117 122.186.16.74
122.186.176.114 122.186.181.124 122.186.202.6 122.186.206.130
122.186.228.6 122.186.242.154 122.186.33.147 122.186.63.154
122.186.70.30 122.186.71.178 122.186.71.6 122.186.79.162
122.190.39.65 122.190.88.102 122.190.88.109 122.190.88.123