Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.30.43.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.30.43.55.			IN	A

;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011002 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 08:13:39 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 55.43.30.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.43.30.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.39.84 attack
DATE:2019-07-16 14:53:04, IP:159.203.39.84, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis)
2019-07-16 23:35:48
119.11.217.42 attackbots
Jul 16 12:43:40 server sshd[41590]: Failed password for invalid user jenkins from 119.11.217.42 port 35961 ssh2
Jul 16 12:59:38 server sshd[45202]: Failed password for invalid user ek from 119.11.217.42 port 51454 ssh2
Jul 16 13:09:45 server sshd[47662]: Failed password for invalid user ra from 119.11.217.42 port 51297 ssh2
2019-07-16 23:56:56
106.52.21.220 attack
fail2ban honeypot
2019-07-16 23:55:51
187.0.211.99 attack
Reported by AbuseIPDB proxy server.
2019-07-16 23:16:02
82.64.139.161 attackspam
detected by Fail2Ban
2019-07-16 23:17:39
92.119.160.125 attack
16.07.2019 15:15:50 Connection to port 3702 blocked by firewall
2019-07-16 23:22:25
80.82.64.127 attackspam
1 attempts last 24 Hours
2019-07-16 23:33:04
217.182.158.104 attackspam
Jul 16 10:51:33 plusreed sshd[16089]: Invalid user xl from 217.182.158.104
...
2019-07-16 22:54:17
118.81.170.189 attackspam
Telnet Server BruteForce Attack
2019-07-16 23:36:24
68.183.133.21 attackspam
Jul 16 11:12:49 vps200512 sshd\[5698\]: Invalid user ftpuser from 68.183.133.21
Jul 16 11:12:49 vps200512 sshd\[5698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.21
Jul 16 11:12:52 vps200512 sshd\[5698\]: Failed password for invalid user ftpuser from 68.183.133.21 port 47884 ssh2
Jul 16 11:17:30 vps200512 sshd\[5789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.21  user=root
Jul 16 11:17:32 vps200512 sshd\[5789\]: Failed password for root from 68.183.133.21 port 44542 ssh2
2019-07-16 23:18:30
101.68.81.66 attack
2019-07-16T15:32:44.226192abusebot.cloudsearch.cf sshd\[5497\]: Invalid user cms from 101.68.81.66 port 49338
2019-07-17 00:02:08
139.199.228.133 attack
Jul 16 18:05:28 giegler sshd[2431]: Invalid user elias from 139.199.228.133 port 26188
2019-07-17 00:11:30
60.169.95.243 attackspam
abuse-sasl
2019-07-16 23:56:14
151.237.11.157 attackspam
PHI,WP GET /wp-login.php
2019-07-17 00:02:39
198.71.235.49 attackspam
fail2ban honeypot
2019-07-17 00:09:51

Recently Reported IPs

130.7.73.34 210.192.59.92 71.117.47.53 137.65.94.82
41.138.85.2 95.46.65.97 103.140.106.248 91.215.100.35
166.69.130.176 50.160.185.146 108.121.137.25 228.224.164.251
102.132.195.162 249.11.5.231 129.32.41.198 202.55.21.19
46.40.62.7 152.192.101.97 50.37.231.215 191.132.159.178