Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bilbao

Region: Basque Country

Country: Spain

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.147.140.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.147.140.55.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031501 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 04:46:06 CST 2020
;; MSG SIZE  rcvd: 118
Host info
55.140.147.159.in-addr.arpa domain name pointer 159-147-140-55.red-acceso.airtel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.140.147.159.in-addr.arpa	name = 159-147-140-55.red-acceso.airtel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.72.156 attack
Mar 22 06:57:17 itv-usvr-01 sshd[25333]: Invalid user userftp from 106.12.72.156
Mar 22 06:57:17 itv-usvr-01 sshd[25333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.72.156
Mar 22 06:57:17 itv-usvr-01 sshd[25333]: Invalid user userftp from 106.12.72.156
Mar 22 06:57:19 itv-usvr-01 sshd[25333]: Failed password for invalid user userftp from 106.12.72.156 port 45054 ssh2
Mar 22 07:02:12 itv-usvr-01 sshd[25544]: Invalid user ryutaro from 106.12.72.156
2020-03-28 02:18:15
106.12.82.245 attack
$f2bV_matches
2020-03-28 02:11:01
190.13.145.60 attackspam
SSH login attempts.
2020-03-28 02:22:23
180.123.43.39 attack
IP: 180.123.43.39
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS4134 Chinanet
   China (CN)
   CIDR 180.120.0.0/14
Log Date: 27/03/2020 11:58:37 AM UTC
2020-03-28 02:29:29
92.63.194.106 attackspam
2020-03-27T18:34:31.499770  sshd[9516]: Invalid user Administrator from 92.63.194.106 port 37177
2020-03-27T18:34:31.508210  sshd[9516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.106
2020-03-27T18:34:31.499770  sshd[9516]: Invalid user Administrator from 92.63.194.106 port 37177
2020-03-27T18:34:33.331165  sshd[9516]: Failed password for invalid user Administrator from 92.63.194.106 port 37177 ssh2
...
2020-03-28 02:01:18
84.236.147.147 attackspam
2020-03-27T19:21:37.889754ns386461 sshd\[24450\]: Invalid user lio from 84.236.147.147 port 43724
2020-03-27T19:21:37.894573ns386461 sshd\[24450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.147.147
2020-03-27T19:21:40.011514ns386461 sshd\[24450\]: Failed password for invalid user lio from 84.236.147.147 port 43724 ssh2
2020-03-27T19:33:03.874061ns386461 sshd\[2835\]: Invalid user mkwu from 84.236.147.147 port 52632
2020-03-27T19:33:03.878707ns386461 sshd\[2835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.147.147
...
2020-03-28 02:33:27
14.142.111.146 attackbots
Unauthorized connection attempt from IP address 14.142.111.146 on Port 445(SMB)
2020-03-28 02:10:11
129.226.50.78 attackspambots
Invalid user itbs from 129.226.50.78 port 40532
2020-03-28 02:34:45
123.31.27.102 attackspambots
2020-03-27T18:17:29.006993struts4.enskede.local sshd\[11196\]: Invalid user lyf from 123.31.27.102 port 60332
2020-03-27T18:17:29.013459struts4.enskede.local sshd\[11196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.27.102
2020-03-27T18:17:31.792440struts4.enskede.local sshd\[11196\]: Failed password for invalid user lyf from 123.31.27.102 port 60332 ssh2
2020-03-27T18:21:49.791953struts4.enskede.local sshd\[11254\]: Invalid user xgh from 123.31.27.102 port 45826
2020-03-27T18:21:49.800037struts4.enskede.local sshd\[11254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.27.102
...
2020-03-28 02:05:01
106.13.228.21 attack
Invalid user rahul from 106.13.228.21 port 60596
2020-03-28 02:26:24
193.70.88.213 attack
leo_www
2020-03-28 02:38:44
31.133.49.18 attack
Unauthorized connection attempt from IP address 31.133.49.18 on Port 445(SMB)
2020-03-28 02:31:09
92.118.37.83 attackspam
03/27/2020-14:03:41.273701 92.118.37.83 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-28 02:11:33
172.105.201.117 attackspam
1585318400 - 03/27/2020 21:13:20 Host: scan-16.security.ipip.net/172.105.201.117 Port: 23 TCP Blocked
...
2020-03-28 02:15:29
139.189.242.221 attack
Time:     Fri Mar 27 09:13:08 2020 -0300
IP:       139.189.242.221 (CN/China/-)
Failures: 15 (ftpd)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-03-28 02:17:35

Recently Reported IPs

73.252.231.6 138.219.233.148 34.226.180.84 192.146.217.221
13.210.29.84 217.243.234.94 131.62.211.158 179.10.33.11
94.27.88.97 160.161.255.48 130.246.7.8 174.201.49.45
51.218.64.59 84.47.3.141 72.90.218.146 14.45.122.231
45.16.191.227 186.52.99.120 64.228.16.199 184.251.119.12