Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Abeokuta

Region: Ogun State

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.242.64.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.242.64.55.			IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061503 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 08:10:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 55.64.242.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.64.242.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.95.193.192 attackspam
RDP brute forcing (d)
2019-07-19 15:58:50
61.158.140.152 attackspambots
Jul 19 00:59:11 mailman dovecot: imap-login: Disconnected (auth failed, 1 attempts): user=, method=PLAIN, rip=61.158.140.152, lip=[munged], TLS: Disconnected
2019-07-19 16:21:46
150.109.196.143 attack
2019-07-19T07:06:25.137541abusebot.cloudsearch.cf sshd\[14592\]: Invalid user web from 150.109.196.143 port 37990
2019-07-19 15:38:15
94.39.248.202 attack
Jul 19 09:08:41 jane sshd\[9242\]: Invalid user update from 94.39.248.202 port 56124
Jul 19 09:08:41 jane sshd\[9242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.39.248.202
Jul 19 09:08:43 jane sshd\[9242\]: Failed password for invalid user update from 94.39.248.202 port 56124 ssh2
...
2019-07-19 15:41:03
117.220.48.218 attackspam
19/7/19@02:00:29: FAIL: Alarm-Intrusion address from=117.220.48.218
...
2019-07-19 15:56:02
51.68.251.215 attackbots
2019-07-19T07:58:36.116493lon01.zurich-datacenter.net sshd\[22087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip215.ip-51-68-251.eu  user=redis
2019-07-19T07:58:37.810302lon01.zurich-datacenter.net sshd\[22087\]: Failed password for redis from 51.68.251.215 port 12267 ssh2
2019-07-19T07:58:39.312595lon01.zurich-datacenter.net sshd\[22087\]: Failed password for redis from 51.68.251.215 port 12267 ssh2
2019-07-19T07:58:41.089113lon01.zurich-datacenter.net sshd\[22087\]: Failed password for redis from 51.68.251.215 port 12267 ssh2
2019-07-19T07:58:43.470244lon01.zurich-datacenter.net sshd\[22087\]: Failed password for redis from 51.68.251.215 port 12267 ssh2
...
2019-07-19 16:34:40
110.244.2.4 attack
[Aegis] @ 2019-07-19 07:00:09  0100 -> Attempt to use mail server as relay (550: Requested action not taken).
2019-07-19 15:40:31
197.231.204.182 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 04:35:22,566 INFO [amun_request_handler] PortScan Detected on Port: 445 (197.231.204.182)
2019-07-19 16:34:19
220.134.144.96 attack
Jul 19 09:50:04 meumeu sshd[25854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.144.96 
Jul 19 09:50:06 meumeu sshd[25854]: Failed password for invalid user alumni from 220.134.144.96 port 59222 ssh2
Jul 19 09:55:40 meumeu sshd[27058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.144.96 
...
2019-07-19 16:04:41
158.69.242.197 attack
\[2019-07-19 03:34:10\] NOTICE\[20804\] chan_sip.c: Registration from '"1161"\' failed for '158.69.242.197:20562' - Wrong password
\[2019-07-19 03:34:10\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-19T03:34:10.021-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1161",SessionID="0x7f06f8009f28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.242.197/20562",Challenge="2f1c9e56",ReceivedChallenge="2f1c9e56",ReceivedHash="bb3c066c26d1cafee54dd91026da4a67"
\[2019-07-19 03:35:39\] NOTICE\[20804\] chan_sip.c: Registration from '"1162"\' failed for '158.69.242.197:9626' - Wrong password
\[2019-07-19 03:35:39\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-19T03:35:39.121-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1162",SessionID="0x7f06f8009f28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.
2019-07-19 15:37:55
178.128.55.52 attack
Jul 19 09:52:27 amit sshd\[23491\]: Invalid user zeus from 178.128.55.52
Jul 19 09:52:27 amit sshd\[23491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.52
Jul 19 09:52:29 amit sshd\[23491\]: Failed password for invalid user zeus from 178.128.55.52 port 39304 ssh2
...
2019-07-19 16:00:10
59.175.144.11 attackspambots
19.07.2019 07:38:22 Connection to port 8545 blocked by firewall
2019-07-19 15:52:37
54.37.158.40 attackbotsspam
Jul 19 09:51:50 SilenceServices sshd[20405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.158.40
Jul 19 09:51:52 SilenceServices sshd[20405]: Failed password for invalid user rb from 54.37.158.40 port 38807 ssh2
Jul 19 09:56:13 SilenceServices sshd[23279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.158.40
2019-07-19 16:04:20
206.189.131.213 attackspambots
19.07.2019 07:17:19 SSH access blocked by firewall
2019-07-19 15:58:15
89.175.153.158 attackspambots
2019-07-19 01:00:38 H=(cmm-g-03.moscow.access.comstar.ru) [89.175.153.158]:44215 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-19 01:00:38 H=(cmm-g-03.moscow.access.comstar.ru) [89.175.153.158]:44215 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-19 01:00:39 H=(cmm-g-03.moscow.access.comstar.ru) [89.175.153.158]:44215 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/89.175.153.158)
...
2019-07-19 15:56:54

Recently Reported IPs

180.76.180.50 180.76.179.204 180.76.174.194 180.76.174.107
180.76.177.191 180.76.115.177 180.76.116.206 180.76.116.51
180.76.115.50 180.76.114.223 180.76.115.68 180.76.115.18
180.76.114.91 180.76.114.17 5.63.153.161 82.215.139.101
82.148.173.240 180.76.181.84 180.76.181.162 231.77.10.149