Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.55.158.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.55.158.159.			IN	A

;; AUTHORITY SECTION:
.			104	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:11:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
159.158.55.13.in-addr.arpa domain name pointer ec2-13-55-158-159.ap-southeast-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.158.55.13.in-addr.arpa	name = ec2-13-55-158-159.ap-southeast-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
196.52.43.93 attack
Unauthorized connection attempt detected from IP address 196.52.43.93 to port 2001
2019-12-29 00:55:29
81.10.21.150 attackspam
" "
2019-12-29 00:39:34
49.88.112.113 attackspambots
Dec 28 06:47:35 wbs sshd\[21114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Dec 28 06:47:37 wbs sshd\[21114\]: Failed password for root from 49.88.112.113 port 12493 ssh2
Dec 28 06:48:34 wbs sshd\[21187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Dec 28 06:48:36 wbs sshd\[21187\]: Failed password for root from 49.88.112.113 port 56864 ssh2
Dec 28 06:49:36 wbs sshd\[21268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2019-12-29 00:49:50
2.38.185.198 attack
Unauthorized connection attempt detected from IP address 2.38.185.198 to port 81
2019-12-29 01:17:08
196.52.43.98 attack
Unauthorized connection attempt detected from IP address 196.52.43.98 to port 5061
2019-12-29 00:55:03
37.146.61.162 attack
Dec 28 17:12:58 lnxweb61 sshd[26942]: Failed password for root from 37.146.61.162 port 59481 ssh2
Dec 28 17:12:58 lnxweb61 sshd[26942]: Failed password for root from 37.146.61.162 port 59481 ssh2
2019-12-29 00:39:06
14.50.8.145 attack
Unauthorized connection attempt detected from IP address 14.50.8.145 to port 9000
2019-12-29 00:50:52
201.238.154.236 attackbotsspam
Unauthorized connection attempt detected from IP address 201.238.154.236 to port 7001
2019-12-29 00:41:13
187.212.73.103 attackspam
Unauthorized connection attempt detected from IP address 187.212.73.103 to port 8000
2019-12-29 01:00:14
41.224.254.72 attackbots
Unauthorized connection attempt detected from IP address 41.224.254.72 to port 23
2019-12-29 00:50:14
200.74.172.19 attack
Unauthorized connection attempt detected from IP address 200.74.172.19 to port 8080
2019-12-29 00:54:29
212.49.84.7 attack
Unauthorized connection attempt detected from IP address 212.49.84.7 to port 23
2019-12-29 00:40:25
200.59.121.78 attack
Unauthorized connection attempt detected from IP address 200.59.121.78 to port 5358
2019-12-29 00:41:35
196.52.43.61 attackbots
Unauthorized connection attempt detected from IP address 196.52.43.61 to port 990
2019-12-29 01:20:07
221.157.79.215 attack
Unauthorized connection attempt detected from IP address 221.157.79.215 to port 5555
2019-12-29 00:52:19

Recently Reported IPs

118.172.150.198 13.55.156.17 13.55.167.174 13.55.162.10
13.55.172.111 13.55.162.88 13.55.160.234 13.55.165.83
13.55.156.195 13.55.175.129 118.172.150.200 13.55.182.111
13.55.157.179 13.55.183.136 13.55.186.61 13.55.188.131
13.55.190.156 13.55.190.223 118.172.150.204 13.55.191.121