Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.215.130.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.215.130.55.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:59:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 55.130.215.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.130.215.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.29.219.20 attack
Wordpress login attempts
2020-09-29 07:01:15
45.178.0.163 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-09-29 07:02:55
171.34.78.119 attack
Sep 29 01:24:53 dhoomketu sshd[3437998]: Invalid user nagios from 171.34.78.119 port 9648
Sep 29 01:24:53 dhoomketu sshd[3437998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.78.119 
Sep 29 01:24:53 dhoomketu sshd[3437998]: Invalid user nagios from 171.34.78.119 port 9648
Sep 29 01:24:55 dhoomketu sshd[3437998]: Failed password for invalid user nagios from 171.34.78.119 port 9648 ssh2
Sep 29 01:27:16 dhoomketu sshd[3438020]: Invalid user diana from 171.34.78.119 port 9649
...
2020-09-29 06:53:14
116.55.227.143 attackspam
1433/tcp 1433/tcp 1433/tcp...
[2020-08-11/09-27]6pkt,1pt.(tcp)
2020-09-29 07:17:39
172.69.63.159 attack
srv02 DDoS Malware Target(80:http) ..
2020-09-29 07:22:02
107.170.227.141 attackspambots
bruteforce detected
2020-09-29 07:09:03
139.198.121.63 attackbots
Sep 29 00:38:15 * sshd[28450]: Failed password for root from 139.198.121.63 port 52780 ssh2
2020-09-29 07:07:26
200.69.234.168 attackbots
5x Failed Password
2020-09-29 07:12:15
168.0.174.218 attack
Automatic report - Banned IP Access
2020-09-29 07:24:12
45.129.33.81 attackbotsspam
[MK-VM3] Blocked by UFW
2020-09-29 07:05:17
116.92.213.114 attackspam
Invalid user ruby from 116.92.213.114 port 38590
2020-09-29 07:24:44
74.120.14.30 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 9200 proto: tcp cat: Misc Attackbytes: 60
2020-09-29 06:55:44
162.0.236.242 attack
Invalid user admin from 162.0.236.242 port 50924
2020-09-29 07:18:45
64.227.106.112 attackspambots
trying to access non-authorized port
2020-09-29 07:27:01
149.56.45.139 attack
SSH Invalid Login
2020-09-29 06:49:55

Recently Reported IPs

142.82.108.24 97.39.229.144 53.140.132.136 205.231.221.138
152.168.124.59 213.9.156.122 47.99.108.17 103.55.52.117
192.194.170.236 65.244.129.199 114.65.62.245 148.195.39.91
77.177.168.231 142.70.162.58 81.68.114.48 181.252.102.69
20.112.19.27 213.232.227.193 231.53.92.233 209.51.34.170