Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cape Town

Region: Western Cape

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.1.55.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.1.55.183.			IN	A

;; AUTHORITY SECTION:
.			165	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020801 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 09 14:16:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
183.55.1.169.in-addr.arpa domain name pointer 169-1-55-183.ip.airmobile.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
183.55.1.169.in-addr.arpa	name = 169-1-55-183.ip.airmobile.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
86.97.222.16 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 21:20:43
157.245.168.11 attackbots
50022/tcp 49022/tcp 48022/tcp...
[2020-04-08/30]155pkt,132pt.(tcp)
2020-05-01 21:47:35
64.225.114.147 attackbotsspam
May  1 15:01:55 debian-2gb-nbg1-2 kernel: \[10597027.951264\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=64.225.114.147 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=39392 PROTO=TCP SPT=41693 DPT=1183 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-01 21:33:01
71.6.233.123 attackspambots
firewall-block, port(s): 4000/tcp
2020-05-01 21:28:20
124.118.129.5 attack
Invalid user england from 124.118.129.5 port 40644
2020-05-01 21:42:18
1.60.204.174 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 21:55:44
5.44.197.24 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 21:49:39
191.34.162.186 attackspam
May  1 14:03:36 meumeu sshd[7329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.162.186 
May  1 14:03:37 meumeu sshd[7329]: Failed password for invalid user david from 191.34.162.186 port 55960 ssh2
May  1 14:08:20 meumeu sshd[8145]: Failed password for root from 191.34.162.186 port 38258 ssh2
...
2020-05-01 21:22:10
45.13.93.90 attack
Port scan(s) denied
2020-05-01 21:36:54
165.84.180.12 attackspam
May  1 15:33:55 host sshd[13847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165084180012.ctinets.com  user=root
May  1 15:33:58 host sshd[13847]: Failed password for root from 165.84.180.12 port 35138 ssh2
...
2020-05-01 21:35:12
196.52.43.55 attackspam
srv02 Mass scanning activity detected Target: 3390  ..
2020-05-01 21:23:07
164.125.149.197 attack
May  1 12:13:29 work-partkepr sshd\[3476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197  user=root
May  1 12:13:31 work-partkepr sshd\[3476\]: Failed password for root from 164.125.149.197 port 56364 ssh2
...
2020-05-01 21:47:07
92.118.160.1 attackbots
Port scan(s) denied
2020-05-01 21:30:25
80.82.69.130 attackspam
Port scan(s) denied
2020-05-01 21:26:00
222.186.180.6 attackbots
SSH login attempts
2020-05-01 21:50:18

Recently Reported IPs

196.18.198.155 2.242.80.41 49.36.30.211 95.181.150.182
222.4.196.176 198.21.193.29 220.15.212.238 199.182.35.140
5.101.154.123 230.194.151.47 19.165.30.135 132.47.22.221
160.125.33.105 7.94.89.197 248.18.184.24 132.69.98.130
14.81.170.165 196.190.52.62 94.130.145.46 148.204.108.215