Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kansas City

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.81.55.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.81.55.42.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122700 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 27 15:27:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
42.55.81.168.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 42.55.81.168.in-addr.arpa.: No answer

Authoritative answers can be found from:
42.55.81.168.in-addr.arpa
	origin = ns1.dlr.ftaires.com
	mail addr = none.invalid
	serial = 0
	refresh = 3600
	retry = 1800
	expire = 604800
	minimum = 600
Related IP info:
Related comments:
IP Type Details Datetime
202.44.251.230 attackbots
Unauthorized connection attempt detected from IP address 202.44.251.230 to port 8080
2020-06-29 03:45:15
122.165.132.5 attackspambots
Jun 28 17:34:46 scw-6657dc sshd[27960]: Failed password for root from 122.165.132.5 port 39990 ssh2
Jun 28 17:34:46 scw-6657dc sshd[27960]: Failed password for root from 122.165.132.5 port 39990 ssh2
Jun 28 17:41:03 scw-6657dc sshd[28168]: Invalid user ansibleuser from 122.165.132.5 port 38818
...
2020-06-29 04:17:01
94.62.56.78 attack
Unauthorized connection attempt detected from IP address 94.62.56.78 to port 445
2020-06-29 03:58:25
39.97.96.91 attackspam
Unauthorized connection attempt detected from IP address 39.97.96.91 to port 8177
2020-06-29 04:05:29
191.242.126.33 attackbotsspam
Unauthorized connection attempt detected from IP address 191.242.126.33 to port 23
2020-06-29 04:09:19
177.155.36.250 attackbotsspam
Unauthorized connection attempt detected from IP address 177.155.36.250 to port 23
2020-06-29 04:12:19
150.109.229.166 attackbots
Unauthorized connection attempt detected from IP address 150.109.229.166 to port 4533
2020-06-29 03:54:39
211.216.35.129 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-06-29 04:08:41
222.108.172.197 attack
Unauthorized connection attempt detected from IP address 222.108.172.197 to port 8000
2020-06-29 04:06:47
177.68.214.210 attackbots
Honeypot attack, port: 81, PTR: 177-68-214-210.dsl.telesp.net.br.
2020-06-29 04:13:33
88.103.189.80 attackbots
Unauthorized connection attempt detected from IP address 88.103.189.80 to port 23
2020-06-29 04:23:34
73.223.107.228 attack
Unauthorized connection attempt detected from IP address 73.223.107.228 to port 81
2020-06-29 04:26:14
114.96.70.21 attackspam
Unauthorized connection attempt detected from IP address 114.96.70.21 to port 80
2020-06-29 03:55:46
118.184.168.37 attackbots
Unauthorized connection attempt detected from IP address 118.184.168.37 to port 1433
2020-06-29 03:55:02
177.125.79.197 attackspambots
Unauthorized connection attempt detected from IP address 177.125.79.197 to port 80
2020-06-29 03:51:26

Recently Reported IPs

169.127.80.47 168.82.219.205 168.166.225.189 168.13.92.186
167.45.30.139 167.46.103.40 167.19.146.125 167.126.247.200
167.104.134.8 167.105.247.110 167.107.175.71 166.85.19.64
166.69.207.100 166.84.67.42 166.59.65.192 166.30.175.231
165.69.117.165 165.51.213.175 165.73.64.72 216.161.127.107