Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Agios Konstantinos

Region: Thessaly

Country: Greece

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.54.242.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61549
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.54.242.55.			IN	A

;; AUTHORITY SECTION:
.			428	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061901 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 20 07:09:13 CST 2020
;; MSG SIZE  rcvd: 115
Host info
55.242.54.5.in-addr.arpa domain name pointer ppp005054242055.access.hol.gr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.242.54.5.in-addr.arpa	name = ppp005054242055.access.hol.gr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.196.118.119 attackbotsspam
Sep  1 23:35:25 ny01 sshd[21797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.196.118.119
Sep  1 23:35:27 ny01 sshd[21797]: Failed password for invalid user redmine from 185.196.118.119 port 52414 ssh2
Sep  1 23:39:37 ny01 sshd[22491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.196.118.119
2019-09-02 11:47:29
3.17.57.86 attackbotsspam
dating site crap
3.17.57.86 
ISP
Amazon Technologies Inc.  

Usage Type
Data Center/Web Hosting/Transit  

Hostname(s)
ec2-3-17-57-86.us-east-2.compute.amazonaws.com 
 

Domain Name
amazon.com  

Country
 United States  

City
Columbus, Ohio
2019-09-02 11:26:38
165.227.143.37 attackbots
Sep  1 23:23:38 plusreed sshd[24189]: Invalid user stefan from 165.227.143.37
...
2019-09-02 11:41:15
137.117.190.66 attackspam
Sep  2 06:14:54 intra sshd\[25985\]: Invalid user test from 137.117.190.66Sep  2 06:14:57 intra sshd\[25985\]: Failed password for invalid user test from 137.117.190.66 port 5888 ssh2Sep  2 06:19:21 intra sshd\[26087\]: Invalid user kasandra from 137.117.190.66Sep  2 06:19:22 intra sshd\[26087\]: Failed password for invalid user kasandra from 137.117.190.66 port 5888 ssh2Sep  2 06:23:35 intra sshd\[26174\]: Invalid user joyce from 137.117.190.66Sep  2 06:23:37 intra sshd\[26174\]: Failed password for invalid user joyce from 137.117.190.66 port 5888 ssh2
...
2019-09-02 11:43:40
117.50.49.57 attackspambots
Automatic report - Banned IP Access
2019-09-02 11:18:34
174.138.21.8 attack
Sep  1 17:18:26 web9 sshd\[20265\]: Invalid user wking from 174.138.21.8
Sep  1 17:18:26 web9 sshd\[20265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.8
Sep  1 17:18:28 web9 sshd\[20265\]: Failed password for invalid user wking from 174.138.21.8 port 59834 ssh2
Sep  1 17:23:06 web9 sshd\[21169\]: Invalid user thomas from 174.138.21.8
Sep  1 17:23:06 web9 sshd\[21169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.8
2019-09-02 11:24:46
185.206.224.232 attackbots
Automatic report - Banned IP Access
2019-09-02 11:34:01
122.192.51.202 attackbotsspam
Sep  2 03:41:52 hcbbdb sshd\[20068\]: Invalid user listen from 122.192.51.202
Sep  2 03:41:52 hcbbdb sshd\[20068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.51.202
Sep  2 03:41:54 hcbbdb sshd\[20068\]: Failed password for invalid user listen from 122.192.51.202 port 58498 ssh2
Sep  2 03:46:25 hcbbdb sshd\[20559\]: Invalid user fake from 122.192.51.202
Sep  2 03:46:25 hcbbdb sshd\[20559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.51.202
2019-09-02 11:52:07
207.237.235.99 attackbotsspam
SSHD brute force attack detected by fail2ban
2019-09-02 11:27:06
190.64.141.18 attackbots
$f2bV_matches
2019-09-02 11:27:49
196.29.33.74 attack
445/tcp 445/tcp 445/tcp
[2019-08-20/09-02]3pkt
2019-09-02 11:40:58
180.178.55.10 attack
Sep  1 17:36:45 php2 sshd\[9236\]: Invalid user le from 180.178.55.10
Sep  1 17:36:45 php2 sshd\[9236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.178.55.10
Sep  1 17:36:47 php2 sshd\[9236\]: Failed password for invalid user le from 180.178.55.10 port 46047 ssh2
Sep  1 17:41:17 php2 sshd\[9821\]: Invalid user commando from 180.178.55.10
Sep  1 17:41:17 php2 sshd\[9821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.178.55.10
Sep  1 17:41:19 php2 sshd\[9821\]: Failed password for invalid user commando from 180.178.55.10 port 42720 ssh2
2019-09-02 11:49:50
134.209.7.179 attackspam
Sep  2 05:23:43 MK-Soft-Root1 sshd\[5648\]: Invalid user thomas from 134.209.7.179 port 60664
Sep  2 05:23:43 MK-Soft-Root1 sshd\[5648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.7.179
Sep  2 05:23:46 MK-Soft-Root1 sshd\[5648\]: Failed password for invalid user thomas from 134.209.7.179 port 60664 ssh2
...
2019-09-02 11:31:12
209.97.128.177 attackbots
Sep  1 17:14:59 lcprod sshd\[20784\]: Invalid user bitnami from 209.97.128.177
Sep  1 17:14:59 lcprod sshd\[20784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.128.177
Sep  1 17:15:02 lcprod sshd\[20784\]: Failed password for invalid user bitnami from 209.97.128.177 port 56376 ssh2
Sep  1 17:18:42 lcprod sshd\[21135\]: Invalid user christel from 209.97.128.177
Sep  1 17:18:42 lcprod sshd\[21135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.128.177
2019-09-02 11:21:15
185.234.219.90 attack
Sep  2 02:38:48 mail postfix/smtpd\[20396\]: warning: unknown\[185.234.219.90\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  2 02:52:32 mail postfix/smtpd\[23107\]: warning: unknown\[185.234.219.90\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  2 03:33:48 mail postfix/smtpd\[24699\]: warning: unknown\[185.234.219.90\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  2 03:47:34 mail postfix/smtpd\[25244\]: warning: unknown\[185.234.219.90\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-09-02 11:27:33

Recently Reported IPs

106.74.255.253 148.235.133.42 151.10.162.166 99.12.238.201
124.231.114.167 31.67.178.235 97.101.91.10 67.118.117.211
92.155.22.56 89.31.226.89 175.176.91.183 27.68.77.138
64.101.160.86 50.242.122.193 89.239.251.228 36.220.162.112
118.2.55.16 5.29.112.104 42.184.62.59 143.228.147.7