Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.219.155.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36182
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.219.155.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 349 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:10:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 52.155.219.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.155.219.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
130.211.246.128 attackbotsspam
Jul  9 07:06:57 mail sshd\[14176\]: Invalid user stephanie from 130.211.246.128
Jul  9 07:06:57 mail sshd\[14176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.211.246.128
Jul  9 07:06:58 mail sshd\[14176\]: Failed password for invalid user stephanie from 130.211.246.128 port 36762 ssh2
...
2019-07-09 13:19:19
139.59.75.221 attackspambots
Trying to deliver email spam, but blocked by RBL
2019-07-09 13:00:38
118.70.116.154 attackbotsspam
Unauthorized connection attempt from IP address 118.70.116.154 on Port 445(SMB)
2019-07-09 12:54:05
37.49.230.240 attackspam
Attempts against SMTP/SSMTP
2019-07-09 13:00:04
169.159.131.77 attackspambots
Autoban   169.159.131.77 AUTH/CONNECT
2019-07-09 13:24:51
46.3.96.69 attack
09.07.2019 04:22:22 Connection to port 44499 blocked by firewall
2019-07-09 13:37:32
14.207.47.231 attack
Triggered by Fail2Ban at Vostok web server
2019-07-09 13:12:55
117.3.137.147 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 12:44:25,381 INFO [shellcode_manager] (117.3.137.147) no match, writing hexdump (bbc6f728184270d182e7d0053d53204a :2078298) - MS17010 (EternalBlue)
2019-07-09 13:25:25
59.46.142.114 attack
Unauthorized connection attempt from IP address 59.46.142.114 on Port 445(SMB)
2019-07-09 13:22:24
14.248.109.171 attack
Unauthorized connection attempt from IP address 14.248.109.171 on Port 445(SMB)
2019-07-09 12:44:39
198.71.237.19 attackspam
WP_xmlrpc_attack
2019-07-09 13:05:23
182.75.199.206 attack
Unauthorized connection attempt from IP address 182.75.199.206 on Port 445(SMB)
2019-07-09 12:45:24
140.143.249.134 attackspambots
Jul  9 03:32:01 MK-Soft-VM4 sshd\[20967\]: Invalid user ts from 140.143.249.134 port 34126
Jul  9 03:32:01 MK-Soft-VM4 sshd\[20967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.134
Jul  9 03:32:02 MK-Soft-VM4 sshd\[20967\]: Failed password for invalid user ts from 140.143.249.134 port 34126 ssh2
...
2019-07-09 13:12:22
114.88.143.201 attack
Unauthorized connection attempt from IP address 114.88.143.201 on Port 445(SMB)
2019-07-09 12:59:07
110.78.179.92 attackbots
Unauthorized connection attempt from IP address 110.78.179.92 on Port 445(SMB)
2019-07-09 13:00:56

Recently Reported IPs

228.253.132.85 147.54.105.64 151.181.65.229 99.207.162.72
90.200.227.177 203.53.91.179 54.219.107.140 252.39.146.39
188.136.125.113 30.18.218.242 195.104.210.239 63.56.54.117
229.234.12.249 128.246.173.113 83.245.112.198 46.115.199.31
74.85.118.224 3.92.100.135 37.130.228.14 213.70.193.208