Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.55.199.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16868
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.55.199.119.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 01:32:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 119.199.55.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.199.55.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
84.47.160.114 attackspam
Invalid user gmu from 84.47.160.114 port 43527
2020-01-10 23:49:12
37.114.169.217 attack
Invalid user admin from 37.114.169.217 port 36549
2020-01-10 23:31:26
91.212.150.147 attack
Invalid user test from 91.212.150.147 port 43876
2020-01-10 23:48:37
37.76.153.45 attackbots
Invalid user admin from 37.76.153.45 port 53497
2020-01-10 23:32:00
106.13.136.3 attackspambots
Invalid user sabina from 106.13.136.3 port 56780
2020-01-10 23:45:47
27.66.212.40 attackbots
Invalid user admin from 27.66.212.40 port 53479
2020-01-10 23:34:01
180.180.122.31 attackspam
Jan  9 21:33:20 server sshd\[11189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=node-o4f.pool-180-180.dynamic.totinternet.net  user=root
Jan  9 21:33:22 server sshd\[11189\]: Failed password for root from 180.180.122.31 port 40939 ssh2
Jan 10 16:13:43 server sshd\[31306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=node-o4f.pool-180-180.dynamic.totinternet.net  user=root
Jan 10 16:13:45 server sshd\[31306\]: Failed password for root from 180.180.122.31 port 40834 ssh2
Jan 10 16:23:43 server sshd\[1423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=node-o4f.pool-180-180.dynamic.totinternet.net  user=root
...
2020-01-10 23:39:50
14.186.176.67 attackspam
Invalid user admin from 14.186.176.67 port 48125
2020-01-10 23:35:16
5.188.84.186 attackspam
Attempted WordPress login: "GET /wp-login.php"
2020-01-11 00:01:39
51.144.160.217 attackbots
Automatic report - Banned IP Access
2020-01-10 23:27:50
178.211.180.42 attack
[portscan] Port scan
2020-01-11 00:09:09
211.75.194.80 attackspam
Jan 10 16:20:14 * sshd[7386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.80
Jan 10 16:20:16 * sshd[7386]: Failed password for invalid user setup from 211.75.194.80 port 37614 ssh2
2020-01-10 23:38:39
105.41.211.177 attackspambots
Invalid user user from 105.41.211.177 port 61319
2020-01-10 23:47:10
36.73.133.40 attackspam
Invalid user msfadmin from 36.73.133.40 port 53165
2020-01-10 23:32:58
222.186.175.161 attackbotsspam
Jan 10 17:00:11 * sshd[12040]: Failed password for root from 222.186.175.161 port 53420 ssh2
Jan 10 17:00:23 * sshd[12040]: error: maximum authentication attempts exceeded for root from 222.186.175.161 port 53420 ssh2 [preauth]
2020-01-11 00:00:49

Recently Reported IPs

240.62.93.207 67.38.104.107 119.136.76.61 247.156.18.147
7.249.55.220 143.182.203.178 206.38.54.45 224.145.117.172
224.79.42.134 162.117.223.230 202.10.152.168 212.235.67.42
113.44.206.1 181.127.201.125 54.226.40.12 140.160.173.3
224.151.189.178 9.89.172.165 191.201.93.136 202.221.221.216