Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Level 3 Parent, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.55.84.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48385
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;4.55.84.140.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072001 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 21 02:20:25 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 140.84.55.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 140.84.55.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.196.72.58 attackbots
Jul 28 00:11:19 MK-Soft-VM4 sshd\[25051\]: Invalid user openvpn from 5.196.72.58 port 37140
Jul 28 00:11:19 MK-Soft-VM4 sshd\[25051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.72.58
Jul 28 00:11:21 MK-Soft-VM4 sshd\[25051\]: Failed password for invalid user openvpn from 5.196.72.58 port 37140 ssh2
...
2019-07-28 08:30:08
54.39.147.2 attack
Invalid user user from 54.39.147.2 port 34628
2019-07-28 08:44:41
198.50.206.131 attackspam
Invalid user sybase from 198.50.206.131 port 45958
2019-07-28 08:46:31
119.201.214.130 attackspam
Invalid user cacti from 119.201.214.130 port 44298
2019-07-28 08:41:22
123.191.136.180 attack
REQUESTED PAGE: /current_config/passwd
2019-07-28 08:32:35
83.211.109.73 attackbotsspam
Invalid user adminftp from 83.211.109.73 port 49076
2019-07-28 08:03:53
88.167.95.9 attackspam
Invalid user v from 88.167.95.9 port 47610
2019-07-28 08:43:06
54.37.205.162 attack
Invalid user student from 54.37.205.162 port 60184
2019-07-28 08:04:20
188.213.172.41 attackbotsspam
WordPress wp-login brute force :: 188.213.172.41 0.040 BYPASS [28/Jul/2019:02:45:05  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-28 08:21:40
5.3.6.82 attackspambots
Invalid user soporte from 5.3.6.82 port 47228
2019-07-28 08:35:21
90.59.161.63 attackspam
Invalid user redis from 90.59.161.63 port 43462
2019-07-28 08:27:20
51.255.174.215 attackbotsspam
Invalid user phion from 51.255.174.215 port 35410
2019-07-28 08:04:53
166.157.232.1 attack
Invalid user redis from 166.157.232.1 port 40410
2019-07-28 08:38:57
200.89.175.103 attackbots
Invalid user username from 200.89.175.103 port 58742
2019-07-28 08:09:10
200.72.247.114 attack
Unauthorized connection attempt from IP address 200.72.247.114 on Port 445(SMB)
2019-07-28 08:21:11

Recently Reported IPs

40.129.74.174 2003:d2:df43:8500:d5c3:e806:80bb:ed73 47.157.72.46 202.137.134.73
83.99.208.38 202.137.134.18 170.134.1.9 201.247.58.42
194.235.212.41 156.237.127.204 53.127.117.191 78.18.97.120
186.73.99.225 197.50.75.128 99.206.184.51 196.218.157.30
156.34.75.229 190.152.182.150 80.222.140.117 217.45.33.98