Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.55.180.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.55.180.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:14:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 82.180.55.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.180.55.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.227.87.164 attackspambots
May  5 03:12:50 server postfix/smtpd[10379]: NOQUEUE: reject: RCPT from unknown[45.227.87.164]: 554 5.7.1 Service unavailable; Client host [45.227.87.164] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/45.227.87.164; from= to=<7927378anav@anavveneto.it> proto=ESMTP helo=<45-227-87-164.host.netmais.net.br>
2020-05-05 09:16:15
113.72.10.172 attack
Email rejected due to spam filtering
2020-05-05 09:12:04
46.173.172.103 attackspambots
*Port Scan* detected from 46.173.172.103 (UA/Ukraine/-). 11 hits in the last 130 seconds
2020-05-05 09:25:53
37.49.226.211 attackspambots
SSH bruteforce
2020-05-05 09:42:14
201.208.24.208 attackbots
Honeypot attack, port: 445, PTR: 201-208-24-208.genericrev.cantv.net.
2020-05-05 09:27:43
103.74.239.110 attackbotsspam
May  5 03:39:52 home sshd[15377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.239.110
May  5 03:39:54 home sshd[15377]: Failed password for invalid user scp from 103.74.239.110 port 56672 ssh2
May  5 03:43:51 home sshd[15971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.239.110
...
2020-05-05 09:46:06
62.148.140.227 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-05 09:46:50
60.162.112.118 attack
1588641167 - 05/05/2020 03:12:47 Host: 60.162.112.118/60.162.112.118 Port: 445 TCP Blocked
2020-05-05 09:19:00
103.210.106.208 attackbotsspam
Lines containing failures of 103.210.106.208
May  4 20:51:17 shared04 sshd[16452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.106.208  user=r.r
May  4 20:51:19 shared04 sshd[16452]: Failed password for r.r from 103.210.106.208 port 49518 ssh2
May  4 20:51:19 shared04 sshd[16452]: Received disconnect from 103.210.106.208 port 49518:11: Bye Bye [preauth]
May  4 20:51:19 shared04 sshd[16452]: Disconnected from authenticating user r.r 103.210.106.208 port 49518 [preauth]
May  4 21:01:38 shared04 sshd[20671]: Invalid user virl from 103.210.106.208 port 47528
May  4 21:01:38 shared04 sshd[20671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.106.208
May  4 21:01:40 shared04 sshd[20671]: Failed password for invalid user virl from 103.210.106.208 port 47528 ssh2
May  4 21:01:41 shared04 sshd[20671]: Received disconnect from 103.210.106.208 port 47528:11: Bye Bye [preauth]
May  ........
------------------------------
2020-05-05 09:10:11
14.184.20.255 attackbots
Icarus honeypot on github
2020-05-05 09:33:02
212.73.136.71 attackspam
5x Failed Password
2020-05-05 09:14:51
218.92.0.189 attackbots
May  5 03:35:49 legacy sshd[18761]: Failed password for root from 218.92.0.189 port 40432 ssh2
May  5 03:35:51 legacy sshd[18761]: Failed password for root from 218.92.0.189 port 40432 ssh2
May  5 03:35:52 legacy sshd[18761]: Failed password for root from 218.92.0.189 port 40432 ssh2
...
2020-05-05 09:44:24
35.224.93.149 attackbotsspam
May  5 03:12:25 vps647732 sshd[6148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.224.93.149
May  5 03:12:27 vps647732 sshd[6148]: Failed password for invalid user applprod from 35.224.93.149 port 36898 ssh2
...
2020-05-05 09:40:16
92.63.194.105 attackspambots
Total attacks: 18
2020-05-05 09:34:05
85.202.161.123 attackspambots
5x Failed Password
2020-05-05 09:42:57

Recently Reported IPs

249.112.197.66 200.119.175.230 71.72.177.199 129.47.153.129
93.129.119.243 53.61.237.197 208.98.110.74 187.13.248.34
246.212.183.130 233.9.170.5 95.81.55.202 250.224.98.144
54.56.184.8 186.168.225.9 46.156.198.56 84.81.12.50
35.95.91.162 198.81.24.49 88.220.237.56 232.25.102.202