Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 155.48.180.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21034
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;155.48.180.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 00:28:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 2.180.48.155.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.180.48.155.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.167.3 attackspambots
Aug  4 11:19:46 ns381471 sshd[19656]: Failed password for root from 106.13.167.3 port 44536 ssh2
2020-08-04 19:15:08
87.251.74.19 attackbotsspam
Aug  4 11:51:24 debian-2gb-nbg1-2 kernel: \[18793150.444871\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.19 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=51076 PROTO=TCP SPT=49585 DPT=18750 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-04 18:54:36
51.77.211.227 attack
51.77.211.227 - - [04/Aug/2020:11:42:59 +0100] "POST /wp-login.php HTTP/1.1" 200 2020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.211.227 - - [04/Aug/2020:11:43:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2019 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.211.227 - - [04/Aug/2020:11:43:01 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-04 18:47:19
206.189.3.176 attackspam
2020-08-04T11:28:43.829741n23.at sshd[1932708]: Failed password for root from 206.189.3.176 port 54150 ssh2
2020-08-04T11:32:55.099586n23.at sshd[1936417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.3.176  user=root
2020-08-04T11:32:56.979612n23.at sshd[1936417]: Failed password for root from 206.189.3.176 port 37232 ssh2
...
2020-08-04 18:51:00
222.186.42.57 attackbots
Unauthorized connection attempt detected from IP address 222.186.42.57 to port 22
2020-08-04 19:03:58
45.240.246.142 attackspambots
techno.ws 45.240.246.142 [04/Aug/2020:11:26:38 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4245 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
techno.ws 45.240.246.142 [04/Aug/2020:11:26:39 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4245 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-08-04 19:18:58
165.22.34.222 attack
Aug  4 11:27:08 b-vps wordpress(gpfans.cz)[1796]: Authentication attempt for unknown user buchtic from 165.22.34.222
...
2020-08-04 18:49:53
103.69.218.146 attack
20/8/4@05:26:37: FAIL: Alarm-Network address from=103.69.218.146
20/8/4@05:26:38: FAIL: Alarm-Network address from=103.69.218.146
...
2020-08-04 19:20:18
106.13.201.44 attack
Lines containing failures of 106.13.201.44
Aug  3 18:38:19 mailserver sshd[12629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.44  user=r.r
Aug  3 18:38:21 mailserver sshd[12629]: Failed password for r.r from 106.13.201.44 port 43018 ssh2
Aug  3 18:38:22 mailserver sshd[12629]: Received disconnect from 106.13.201.44 port 43018:11: Bye Bye [preauth]
Aug  3 18:38:22 mailserver sshd[12629]: Disconnected from authenticating user r.r 106.13.201.44 port 43018 [preauth]
Aug  3 18:54:42 mailserver sshd[14589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.44  user=r.r
Aug  3 18:54:44 mailserver sshd[14589]: Failed password for r.r from 106.13.201.44 port 41930 ssh2
Aug  3 18:54:44 mailserver sshd[14589]: Received disconnect from 106.13.201.44 port 41930:11: Bye Bye [preauth]
Aug  3 18:54:44 mailserver sshd[14589]: Disconnected from authenticating user r.r 106.13.201.44 por........
------------------------------
2020-08-04 19:12:26
222.186.173.238 attackspam
Aug  4 07:23:57 plusreed sshd[22586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Aug  4 07:23:59 plusreed sshd[22586]: Failed password for root from 222.186.173.238 port 12526 ssh2
...
2020-08-04 19:27:13
217.153.229.226 attack
2020-08-04T12:55:24.123163ns386461 sshd\[10394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.153.229.226  user=root
2020-08-04T12:55:26.082500ns386461 sshd\[10394\]: Failed password for root from 217.153.229.226 port 33532 ssh2
2020-08-04T13:08:04.422172ns386461 sshd\[21937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.153.229.226  user=root
2020-08-04T13:08:05.714607ns386461 sshd\[21937\]: Failed password for root from 217.153.229.226 port 48876 ssh2
2020-08-04T13:12:05.767955ns386461 sshd\[25778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.153.229.226  user=root
...
2020-08-04 19:16:05
45.129.33.17 attack
firewall-block, port(s): 3344/tcp, 12190/tcp
2020-08-04 19:20:47
116.248.19.6 attackspam
Port probing on unauthorized port 5555
2020-08-04 19:13:13
115.68.207.164 attackbots
Aug  4 14:42:10 lunarastro sshd[23496]: Failed password for root from 115.68.207.164 port 48920 ssh2
2020-08-04 18:57:15
49.85.144.35 attack
 TCP (SYN) 49.85.144.35:15285 -> port 23, len 44
2020-08-04 19:10:00

Recently Reported IPs

201.241.108.194 125.86.58.132 245.198.246.2 65.175.20.52
47.191.186.171 64.145.94.76 123.44.228.26 88.162.217.68
61.255.191.54 208.84.244.216 201.85.244.122 67.185.208.156
161.50.187.129 137.113.79.195 205.141.3.2 94.138.145.254
63.204.156.81 54.49.164.63 219.56.142.10 134.250.79.84