Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.142.212.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;178.142.212.55.			IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062100 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 21 15:19:22 CST 2020
;; MSG SIZE  rcvd: 118
Host info
55.212.142.178.in-addr.arpa domain name pointer dyndsl-178-142-212-055.ewe-ip-backbone.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.212.142.178.in-addr.arpa	name = dyndsl-178-142-212-055.ewe-ip-backbone.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
50.2.214.59 attackbots
Email rejected due to spam filtering
2020-07-26 06:44:22
165.22.104.247 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-26 06:48:19
122.14.219.197 attackspambots
Exploited Host.
2020-07-26 06:43:18
129.28.178.138 attack
Invalid user nas from 129.28.178.138 port 25448
2020-07-26 06:58:05
121.181.15.37 attackbotsspam
Exploited Host.
2020-07-26 06:58:18
122.116.216.196 attack
Exploited Host.
2020-07-26 06:48:39
134.122.29.46 attackspam
Brute-force general attack.
2020-07-26 06:53:52
136.143.146.254 attack
Port 22 Scan, PTR: None
2020-07-26 06:28:43
122.225.105.173 attackbots
Exploited Host.
2020-07-26 06:30:07
38.146.78.46 attackspam
Port 22 Scan, PTR: None
2020-07-26 06:32:21
210.86.239.186 attackbotsspam
Jul 26 01:23:18 pkdns2 sshd\[2636\]: Invalid user xguest from 210.86.239.186Jul 26 01:23:20 pkdns2 sshd\[2636\]: Failed password for invalid user xguest from 210.86.239.186 port 38250 ssh2Jul 26 01:28:16 pkdns2 sshd\[2860\]: Invalid user mila from 210.86.239.186Jul 26 01:28:17 pkdns2 sshd\[2860\]: Failed password for invalid user mila from 210.86.239.186 port 52808 ssh2Jul 26 01:33:05 pkdns2 sshd\[3058\]: Invalid user cturner from 210.86.239.186Jul 26 01:33:08 pkdns2 sshd\[3058\]: Failed password for invalid user cturner from 210.86.239.186 port 39134 ssh2
...
2020-07-26 06:57:34
122.118.125.53 attack
Exploited Host.
2020-07-26 06:46:17
80.82.64.98 attackbots
Jul 25 23:59:06 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.64.98, lip=185.118.197.126, session=
Jul 25 23:59:13 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=80.82.64.98, lip=185.118.197.126, session=
Jul 25 23:59:59 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.64.98, lip=185.118.197.126, session=
Jul 26 00:00:21 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.64.98, lip=185.118.197.126, session=
Jul 26 00:00:38 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN,
2020-07-26 06:53:28
108.174.113.88 attackspambots
Port 22 Scan, PTR: None
2020-07-26 07:03:37
47.74.245.246 attackspam
Invalid user ops from 47.74.245.246 port 39444
2020-07-26 06:44:50

Recently Reported IPs

156.96.117.158 77.170.41.29 143.208.180.63 81.4.108.78
113.20.99.185 51.255.69.12 189.168.192.63 112.3.27.97
60.251.66.178 52.188.2.76 122.116.160.47 123.231.120.161
49.228.211.100 177.66.25.33 103.104.119.58 42.115.92.155
18.223.209.62 200.105.161.98 222.186.171.247 114.232.109.31