Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.55.28.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48385
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.55.28.142.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031102 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 06:01:56 CST 2022
;; MSG SIZE  rcvd: 104
Host info
142.28.55.2.in-addr.arpa domain name pointer 31-154-28-142.orange.net.il.
142.28.55.2.in-addr.arpa domain name pointer 2-55-28-142.orange.net.il.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.28.55.2.in-addr.arpa	name = 2-55-28-142.orange.net.il.
142.28.55.2.in-addr.arpa	name = 31-154-28-142.orange.net.il.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.204.199.73 attack
Port scan denied
2020-10-02 14:18:44
106.12.3.28 attackbots
Invalid user testing from 106.12.3.28 port 45444
2020-10-02 13:51:10
123.13.203.67 attack
Invalid user kevin from 123.13.203.67 port 27744
2020-10-02 14:17:39
111.230.29.17 attackspam
Invalid user cb from 111.230.29.17 port 34434
2020-10-02 13:35:34
202.150.144.65 attackbotsspam
IP attempted unauthorised action
2020-10-02 14:05:22
103.89.91.82 attack
2020-10-02 07:20:15 dovecot_login authenticator failed for \(WWxwWUcHy\) \[103.89.91.82\]: 535 Incorrect authentication data \(set_id=canal@no-server.de\)
2020-10-02 07:20:15 dovecot_login authenticator failed for \(JmBvbQMt\) \[103.89.91.82\]: 535 Incorrect authentication data \(set_id=canon@no-server.de\)
2020-10-02 07:20:34 dovecot_login authenticator failed for \(lQBgZGRWk\) \[103.89.91.82\]: 535 Incorrect authentication data \(set_id=canal@no-server.de\)
2020-10-02 07:20:34 dovecot_login authenticator failed for \(sFbpQKzaKs\) \[103.89.91.82\]: 535 Incorrect authentication data \(set_id=canon@no-server.de\)
2020-10-02 07:20:54 dovecot_login authenticator failed for \(T7Mo85bI\) \[103.89.91.82\]: 535 Incorrect authentication data \(set_id=canon@no-server.de\)
2020-10-02 07:20:54 dovecot_login authenticator failed for \(bBy0cSWFC6\) \[103.89.91.82\]: 535 Incorrect authentication data \(set_id=canal@no-server.de\)
...
2020-10-02 13:57:23
213.108.134.121 attackbots
Repeated RDP login failures. Last user: Test
2020-10-02 14:09:22
183.129.202.6 attackspambots
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=45746  .  dstport=1433  .     (3836)
2020-10-02 14:00:26
122.224.237.234 attackbots
5x Failed Password
2020-10-02 14:02:46
64.227.33.191 attackspambots
2020-10-01T15:35:25.423894linuxbox-skyline sshd[242379]: Invalid user logview from 64.227.33.191 port 34798
...
2020-10-02 13:54:36
40.114.197.106 attackspambots
2020-10-01T22:44:04.044087mail.broermann.family sshd[8088]: Invalid user www from 40.114.197.106 port 60884
2020-10-01T22:44:04.049233mail.broermann.family sshd[8088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.114.197.106
2020-10-01T22:44:04.044087mail.broermann.family sshd[8088]: Invalid user www from 40.114.197.106 port 60884
2020-10-01T22:44:06.644814mail.broermann.family sshd[8088]: Failed password for invalid user www from 40.114.197.106 port 60884 ssh2
2020-10-01T22:48:17.971000mail.broermann.family sshd[8444]: Invalid user pepe from 40.114.197.106 port 42090
...
2020-10-02 13:36:06
212.70.149.83 attack
Oct  2 07:38:15 srv01 postfix/smtpd\[28835\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 07:38:17 srv01 postfix/smtpd\[748\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 07:38:21 srv01 postfix/smtpd\[32225\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 07:38:23 srv01 postfix/smtpd\[7646\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 07:38:41 srv01 postfix/smtpd\[32225\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-02 13:39:19
45.141.84.175 attack
Icarus honeypot on github
2020-10-02 14:04:51
185.202.1.148 attackbotsspam
Repeated RDP login failures. Last user: Administrator
2020-10-02 14:16:11
192.241.235.192 attackbots
Port scan denied
2020-10-02 13:47:25

Recently Reported IPs

118.163.193.199 139.38.83.90 118.163.2.22 118.163.20.13
118.163.202.159 118.163.206.2 118.163.208.111 166.34.47.156
118.163.209.96 23.29.3.202 56.107.113.18 84.41.246.202
118.163.212.169 118.163.212.52 118.163.213.199 166.246.231.60
118.163.213.204 118.163.213.209 118.163.213.210 191.93.175.100