Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.135.55.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.135.55.200.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100500 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 06 00:05:14 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 200.55.135.199.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 200.55.135.199.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
41.68.165.239 attack
WordPress brute force
2020-07-27 05:31:40
59.52.36.180 attackspambots
Unauthorized connection attempt from IP address 59.52.36.180 on Port 445(SMB)
2020-07-27 05:04:53
89.97.218.142 attackbotsspam
Jul 27 07:11:07 NG-HHDC-SVS-001 sshd[2897]: Invalid user duan from 89.97.218.142
...
2020-07-27 05:18:12
72.164.246.194 attackbotsspam
Unauthorized connection attempt from IP address 72.164.246.194 on Port 445(SMB)
2020-07-27 05:01:32
61.177.172.54 attackspambots
Jul 26 23:17:50 vm0 sshd[32296]: Failed password for root from 61.177.172.54 port 55451 ssh2
Jul 26 23:17:59 vm0 sshd[32296]: Failed password for root from 61.177.172.54 port 55451 ssh2
...
2020-07-27 05:20:43
106.12.133.103 attackspambots
Jul 26 23:09:55 abendstille sshd\[27973\]: Invalid user admin from 106.12.133.103
Jul 26 23:09:55 abendstille sshd\[27973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.103
Jul 26 23:09:56 abendstille sshd\[27973\]: Failed password for invalid user admin from 106.12.133.103 port 52392 ssh2
Jul 26 23:12:19 abendstille sshd\[30249\]: Invalid user manny from 106.12.133.103
Jul 26 23:12:19 abendstille sshd\[30249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.103
...
2020-07-27 05:27:31
95.182.122.131 attackspambots
Invalid user ctrls from 95.182.122.131 port 36250
2020-07-27 05:07:13
218.253.212.42 attack
Unauthorized connection attempt from IP address 218.253.212.42 on Port 445(SMB)
2020-07-27 05:13:36
185.176.27.162 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-07-27 05:21:49
125.31.42.146 attackspambots
Unauthorized connection attempt from IP address 125.31.42.146 on Port 445(SMB)
2020-07-27 05:25:07
14.142.143.138 attackspam
Jul 26 16:40:09 NPSTNNYC01T sshd[9583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.143.138
Jul 26 16:40:11 NPSTNNYC01T sshd[9583]: Failed password for invalid user weldon from 14.142.143.138 port 51490 ssh2
Jul 26 16:43:00 NPSTNNYC01T sshd[9881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.143.138
...
2020-07-27 05:04:15
36.81.36.116 attackbotsspam
WordPress brute force
2020-07-27 05:32:11
124.16.4.5 attack
Jul 26 22:50:06 vps639187 sshd\[444\]: Invalid user maciej from 124.16.4.5 port 37460
Jul 26 22:50:06 vps639187 sshd\[444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.4.5
Jul 26 22:50:09 vps639187 sshd\[444\]: Failed password for invalid user maciej from 124.16.4.5 port 37460 ssh2
...
2020-07-27 05:01:06
20.37.249.52 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 20.37.249.52 (US/United States/-): 5 in the last 3600 secs
2020-07-27 05:23:20
186.88.8.221 attack
WordPress brute force
2020-07-27 05:38:15

Recently Reported IPs

76.246.12.162 86.105.52.90 27.125.119.221 9.217.77.62
94.191.94.148 240.23.46.205 158.169.31.224 102.85.210.75
253.47.236.108 35.182.145.222 129.21.187.41 203.170.104.213
55.43.152.168 133.55.89.149 22.239.161.19 27.109.18.190
211.234.173.96 113.72.96.247 76.214.165.203 19.51.12.178