Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.115.8.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;160.115.8.55.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030200 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 15:56:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 55.8.115.160.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.8.115.160.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.171.212 attackspambots
fail2ban honeypot
2019-06-24 11:17:20
200.66.116.24 attackspambots
SMTP-sasl brute force
...
2019-06-24 11:38:43
49.50.249.40 attack
Automatic report - Web App Attack
2019-06-24 11:22:54
95.6.61.11 attackspam
SSH invalid-user multiple login try
2019-06-24 11:30:17
148.66.132.169 attack
148.66.132.169 - - [23/Jun/2019:21:50:03 +0200] "POST [munged]wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-06-24 11:30:00
54.39.15.178 attackspambots
ADMIN
2019-06-24 10:52:44
128.199.133.249 attackbots
Jun 24 04:46:05 vpn01 sshd\[30447\]: Invalid user sa from 128.199.133.249
Jun 24 04:46:05 vpn01 sshd\[30447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249
Jun 24 04:46:07 vpn01 sshd\[30447\]: Failed password for invalid user sa from 128.199.133.249 port 51741 ssh2
2019-06-24 11:23:54
190.13.173.67 attackspam
$f2bV_matches
2019-06-24 11:00:47
103.138.109.197 attackbotsspam
Jun 24 04:16:38 mail postfix/smtpd\[10035\]: warning: unknown\[103.138.109.197\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 04:16:45 mail postfix/smtpd\[10035\]: warning: unknown\[103.138.109.197\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 04:16:55 mail postfix/smtpd\[10035\]: warning: unknown\[103.138.109.197\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 11:09:57
114.232.134.168 attackbots
2019-06-23T21:33:45.242925 X postfix/smtpd[39209]: warning: unknown[114.232.134.168]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:34:11.151472 X postfix/smtpd[39209]: warning: unknown[114.232.134.168]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:51:36.065653 X postfix/smtpd[41518]: warning: unknown[114.232.134.168]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 10:54:50
180.182.245.143 attackbots
" "
2019-06-24 10:51:09
91.61.37.190 attackbotsspam
20 attempts against mh-ssh on hill.magehost.pro
2019-06-24 11:15:46
106.58.213.77 attackspam
Trying ports that it shouldn't be.
2019-06-24 11:05:08
191.53.59.67 attackspam
failed_logins
2019-06-24 10:57:45
139.162.112.248 attackbots
3389BruteforceFW21
2019-06-24 11:25:33

Recently Reported IPs

47.124.144.13 84.36.54.181 24.105.74.194 30.201.105.75
254.195.11.132 223.216.168.74 117.10.73.47 128.196.92.80
239.129.197.202 199.55.58.122 43.245.121.46 28.207.159.12
212.122.140.78 19.82.4.182 238.213.175.178 137.65.206.125
191.149.229.76 58.161.139.0 83.157.56.24 200.196.195.36