Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.55.154.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.55.154.11.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122801 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 29 05:29:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 11.154.55.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.154.55.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.139.24.190 attack
Aug 25 11:40:43 [host] sshd[28747]: Invalid user cron from 37.139.24.190
Aug 25 11:40:43 [host] sshd[28747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.24.190
Aug 25 11:40:46 [host] sshd[28747]: Failed password for invalid user cron from 37.139.24.190 port 55820 ssh2
2019-08-25 18:36:08
51.38.237.206 attack
Aug 25 00:31:51 eddieflores sshd\[22567\]: Invalid user candy from 51.38.237.206
Aug 25 00:31:51 eddieflores sshd\[22567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.ip-51-38-237.eu
Aug 25 00:31:53 eddieflores sshd\[22567\]: Failed password for invalid user candy from 51.38.237.206 port 59518 ssh2
Aug 25 00:36:12 eddieflores sshd\[22948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.ip-51-38-237.eu  user=mail
Aug 25 00:36:14 eddieflores sshd\[22948\]: Failed password for mail from 51.38.237.206 port 52414 ssh2
2019-08-25 18:47:58
62.76.84.115 attackspam
Unauthorized connection attempt from IP address 62.76.84.115 on Port 445(SMB)
2019-08-25 18:13:29
163.172.224.71 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-25 18:36:40
177.74.239.69 attackspambots
Unauthorized connection attempt from IP address 177.74.239.69 on Port 445(SMB)
2019-08-25 18:03:58
203.95.212.41 attackspam
Aug 25 10:13:02 hb sshd\[20727\]: Invalid user mysftp from 203.95.212.41
Aug 25 10:13:02 hb sshd\[20727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41
Aug 25 10:13:04 hb sshd\[20727\]: Failed password for invalid user mysftp from 203.95.212.41 port 58989 ssh2
Aug 25 10:20:40 hb sshd\[21341\]: Invalid user admin from 203.95.212.41
Aug 25 10:20:40 hb sshd\[21341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41
2019-08-25 18:34:20
115.178.24.72 attackbots
Aug 25 12:07:02 MainVPS sshd[21001]: Invalid user csi from 115.178.24.72 port 60722
Aug 25 12:07:02 MainVPS sshd[21001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.178.24.72
Aug 25 12:07:02 MainVPS sshd[21001]: Invalid user csi from 115.178.24.72 port 60722
Aug 25 12:07:04 MainVPS sshd[21001]: Failed password for invalid user csi from 115.178.24.72 port 60722 ssh2
Aug 25 12:13:57 MainVPS sshd[21582]: Invalid user hg from 115.178.24.72 port 48766
...
2019-08-25 18:59:31
47.94.201.5 attackspambots
Excessive Port-Scanning
2019-08-25 18:33:25
14.192.17.145 attack
Aug 25 12:00:32 dedicated sshd[23062]: Invalid user nnn from 14.192.17.145 port 53173
2019-08-25 18:25:18
139.199.112.85 attackspam
Aug 25 10:19:03 pornomens sshd\[32285\]: Invalid user server from 139.199.112.85 port 47538
Aug 25 10:19:03 pornomens sshd\[32285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.112.85
Aug 25 10:19:05 pornomens sshd\[32285\]: Failed password for invalid user server from 139.199.112.85 port 47538 ssh2
...
2019-08-25 18:50:09
223.207.250.212 attack
Unauthorized connection attempt from IP address 223.207.250.212 on Port 445(SMB)
2019-08-25 19:00:17
185.176.27.250 attackbots
08/25/2019-05:58:46.700963 185.176.27.250 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-25 18:07:51
211.181.237.21 attackspambots
Unauthorized connection attempt from IP address 211.181.237.21 on Port 445(SMB)
2019-08-25 18:54:25
157.230.97.200 attackbots
Aug 25 00:11:49 lcprod sshd\[27044\]: Invalid user gituser from 157.230.97.200
Aug 25 00:11:49 lcprod sshd\[27044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.97.200
Aug 25 00:11:51 lcprod sshd\[27044\]: Failed password for invalid user gituser from 157.230.97.200 port 60022 ssh2
Aug 25 00:15:57 lcprod sshd\[27396\]: Invalid user operator from 157.230.97.200
Aug 25 00:15:57 lcprod sshd\[27396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.97.200
2019-08-25 18:26:33
54.38.183.181 attack
Aug 25 00:40:49 eddieflores sshd\[23447\]: Invalid user valet from 54.38.183.181
Aug 25 00:40:49 eddieflores sshd\[23447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.ip-54-38-183.eu
Aug 25 00:40:50 eddieflores sshd\[23447\]: Failed password for invalid user valet from 54.38.183.181 port 53252 ssh2
Aug 25 00:44:53 eddieflores sshd\[23839\]: Invalid user kv from 54.38.183.181
Aug 25 00:44:53 eddieflores sshd\[23839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.ip-54-38-183.eu
2019-08-25 18:50:37

Recently Reported IPs

110.165.70.82 223.194.34.90 143.193.160.192 59.169.87.63
230.185.15.220 209.206.57.159 134.69.252.116 40.219.233.119
29.82.208.246 176.235.45.239 125.194.152.38 104.144.100.0
4.55.25.114 230.64.99.223 16.73.123.92 60.33.28.50
42.233.47.231 228.116.151.244 136.238.220.159 235.154.23.101