Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.106.55.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.106.55.207.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:23:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 207.55.106.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.55.106.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.248.89 attack
157.230.248.89 - - [22/Sep/2020:21:21:43 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.248.89 - - [22/Sep/2020:21:21:44 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.248.89 - - [22/Sep/2020:21:21:46 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-23 09:03:44
119.28.59.194 attackbotsspam
Sep 22 20:23:11 r.ca sshd[25561]: Failed password for root from 119.28.59.194 port 57690 ssh2
2020-09-23 08:37:00
51.79.53.21 attackspam
Sep 23 06:03:10 santamaria sshd\[24943\]: Invalid user ks from 51.79.53.21
Sep 23 06:03:10 santamaria sshd\[24943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.53.21
Sep 23 06:03:12 santamaria sshd\[24943\]: Failed password for invalid user ks from 51.79.53.21 port 60452 ssh2
...
2020-09-23 12:03:41
167.248.133.52 attack
167.248.133.52 - - [23/Sep/2020:00:23:42 +0200] "GET / HTTP/1.1" 200 612 "-" "-"
167.248.133.52 - - [23/Sep/2020:00:23:43 +0200] "GET / HTTP/1.1" 200 396 "-" "Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)"
2020-09-23 08:36:37
182.162.17.244 attack
Time:     Tue Sep 22 22:49:50 2020 +0000
IP:       182.162.17.244 (KR/South Korea/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 22 22:35:28  sshd[29375]: Invalid user werkstatt from 182.162.17.244 port 40875
Sep 22 22:35:30  sshd[29375]: Failed password for invalid user werkstatt from 182.162.17.244 port 40875 ssh2
Sep 22 22:43:54  sshd[30175]: Invalid user ftpadmin from 182.162.17.244 port 54683
Sep 22 22:43:56  sshd[30175]: Failed password for invalid user ftpadmin from 182.162.17.244 port 54683 ssh2
Sep 22 22:49:46  sshd[30656]: Invalid user user from 182.162.17.244 port 53471
2020-09-23 08:42:06
77.120.172.196 attackbots
20/9/22@15:04:24: FAIL: Alarm-Network address from=77.120.172.196
...
2020-09-23 08:58:48
133.106.210.217 attackbotsspam
2020-09-22T19:02:26+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-23 08:51:53
128.199.96.1 attackbots
Sep 22 18:50:07 Ubuntu-1404-trusty-64-minimal sshd\[30414\]: Invalid user user1 from 128.199.96.1
Sep 22 18:50:07 Ubuntu-1404-trusty-64-minimal sshd\[30414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.96.1
Sep 22 18:50:09 Ubuntu-1404-trusty-64-minimal sshd\[30414\]: Failed password for invalid user user1 from 128.199.96.1 port 44060 ssh2
Sep 22 19:02:31 Ubuntu-1404-trusty-64-minimal sshd\[6818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.96.1  user=root
Sep 22 19:02:33 Ubuntu-1404-trusty-64-minimal sshd\[6818\]: Failed password for root from 128.199.96.1 port 49602 ssh2
2020-09-23 08:37:48
181.143.228.170 attackbots
Invalid user admin from 181.143.228.170 port 56686
2020-09-23 08:57:55
195.54.160.183 attackbotsspam
SSH-BruteForce
2020-09-23 09:02:51
106.13.225.60 attackspambots
Sep 22 20:56:21 * sshd[13054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.225.60
Sep 22 20:56:23 * sshd[13054]: Failed password for invalid user drcomadmin from 106.13.225.60 port 59488 ssh2
2020-09-23 12:05:27
174.217.15.31 attackspam
Brute forcing email accounts
2020-09-23 08:45:52
202.143.111.42 attackbots
$f2bV_matches
2020-09-23 12:07:27
46.101.220.225 attackspam
Invalid user server from 46.101.220.225 port 37927
2020-09-23 08:40:50
68.183.236.92 attackspam
$f2bV_matches
2020-09-23 08:38:31

Recently Reported IPs

164.100.94.68 164.106.120.80 164.106.130.6 164.11.4.40
164.111.37.167 164.115.23.63 164.115.24.128 164.106.88.18
164.100.94.186 164.115.32.48 164.115.27.172 164.115.40.36
164.115.25.121 164.115.45.83 164.115.40.158 164.115.26.128
164.115.76.21 164.115.43.152 164.119.160.135 164.119.161.105