Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.55.201.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51575
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.55.201.63.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091902 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 20 11:03:04 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 63.201.55.148.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 63.201.55.148.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
142.119.15.146 attackbots
Port probing on unauthorized port 5555
2020-08-20 16:23:32
115.159.190.174 attackbotsspam
2020-08-20T04:58:42+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-08-20 16:03:03
218.92.0.250 attackspam
Aug 20 07:40:35 rush sshd[13008]: Failed password for root from 218.92.0.250 port 40338 ssh2
Aug 20 07:40:38 rush sshd[13008]: Failed password for root from 218.92.0.250 port 40338 ssh2
Aug 20 07:40:42 rush sshd[13008]: Failed password for root from 218.92.0.250 port 40338 ssh2
Aug 20 07:40:45 rush sshd[13008]: Failed password for root from 218.92.0.250 port 40338 ssh2
...
2020-08-20 15:46:29
198.154.99.175 attackspambots
Aug 20 07:48:00 cosmoit sshd[13720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.154.99.175
2020-08-20 16:16:17
190.194.152.238 attack
Invalid user rena from 190.194.152.238 port 33780
2020-08-20 16:27:41
5.251.252.224 attack
Email rejected due to spam filtering
2020-08-20 15:54:59
180.76.167.78 attackspam
Invalid user libuuid from 180.76.167.78 port 47730
2020-08-20 16:06:38
51.83.41.120 attack
2020-08-20T09:38:02.246345v22018076590370373 sshd[7192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.41.120
2020-08-20T09:38:02.239928v22018076590370373 sshd[7192]: Invalid user steve from 51.83.41.120 port 36678
2020-08-20T09:38:04.615365v22018076590370373 sshd[7192]: Failed password for invalid user steve from 51.83.41.120 port 36678 ssh2
2020-08-20T09:41:37.868272v22018076590370373 sshd[2475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.41.120  user=root
2020-08-20T09:41:39.750471v22018076590370373 sshd[2475]: Failed password for root from 51.83.41.120 port 44004 ssh2
...
2020-08-20 16:14:03
195.154.174.175 attack
SSH brutforce
2020-08-20 15:50:33
51.15.56.119 attackbots
TIME: Thu, 20 Aug 2020 00:50:57 -0300
 REQUEST: /.well-known/security.txt
2020-08-20 16:28:11
172.81.251.60 attackspambots
$f2bV_matches
2020-08-20 16:21:35
113.208.119.154 attack
Aug 20 09:31:04 Invalid user dan from 113.208.119.154 port 60061
2020-08-20 16:22:24
164.0.192.116 attackbotsspam
Email rejected due to spam filtering
2020-08-20 16:04:34
120.132.6.27 attack
Invalid user kys from 120.132.6.27 port 40019
2020-08-20 16:14:22
114.33.227.50 attackbots
" "
2020-08-20 15:47:17

Recently Reported IPs

219.113.137.25 212.83.56.54 185.137.233.120 73.238.245.51
195.178.37.82 162.147.131.90 82.95.151.26 113.80.245.207
182.69.241.54 60.191.108.178 79.25.66.6 27.14.214.58
121.22.2.216 160.93.13.217 186.75.240.66 179.74.94.118
161.177.147.249 93.189.149.248 51.75.53.115 1.143.168.182