Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Athens

Region: Attica

Country: Greece

Internet Service Provider: Vodafone

Hostname: unknown

Organization: Vodafone-panafon Hellenic Telecommunications Company SA

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
5.55.228.218 attack
 TCP (SYN) 5.55.228.218:21642 -> port 23, len 44
2020-09-20 02:19:03
5.55.228.218 attack
 TCP (SYN) 5.55.228.218:21642 -> port 23, len 44
2020-09-19 18:13:33
5.55.254.88 attackspam
Email rejected due to spam filtering
2020-09-18 21:45:26
5.55.254.88 attack
Email rejected due to spam filtering
2020-09-18 14:01:44
5.55.254.88 attackspam
Email rejected due to spam filtering
2020-09-18 04:19:46
5.55.227.159 attack
1597610051 - 08/16/2020 22:34:11 Host: 5.55.227.159/5.55.227.159 Port: 23 TCP Blocked
...
2020-08-17 04:57:24
5.55.229.196 attackspambots
Unauthorized connection attempt detected from IP address 5.55.229.196 to port 8080
2020-07-25 22:45:21
5.55.205.234 attackspam
Unauthorized connection attempt detected from IP address 5.55.205.234 to port 23
2020-07-22 18:45:56
5.55.249.209 attackbots
23/tcp
[2020-07-08]1pkt
2020-07-09 02:30:59
5.55.242.67 attackspambots
Unauthorized connection attempt detected from IP address 5.55.242.67 to port 23
2020-06-13 08:34:41
5.55.224.25 attack
Unauthorized connection attempt detected from IP address 5.55.224.25 to port 23
2020-03-17 19:33:59
5.55.219.72 attack
Unauthorized connection attempt detected from IP address 5.55.219.72 to port 23 [J]
2020-01-29 06:29:40
5.55.244.90 attackbots
firewall-block, port(s): 2323/tcp
2019-12-24 15:19:22
5.55.225.248 attackbotsspam
Telnet Server BruteForce Attack
2019-12-17 08:40:19
5.55.232.19 attackspam
Telnet Server BruteForce Attack
2019-11-16 03:55:00
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.55.2.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63219
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.55.2.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon May 06 22:14:59 +08 2019
;; MSG SIZE  rcvd: 113

Host info
34.2.55.5.in-addr.arpa domain name pointer ppp005055002034.access.hol.gr.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
34.2.55.5.in-addr.arpa	name = ppp005055002034.access.hol.gr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
182.61.177.109 attackbotsspam
Dec  6 11:02:50 ns382633 sshd\[27013\]: Invalid user actiongraphics from 182.61.177.109 port 48104
Dec  6 11:02:50 ns382633 sshd\[27013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109
Dec  6 11:02:52 ns382633 sshd\[27013\]: Failed password for invalid user actiongraphics from 182.61.177.109 port 48104 ssh2
Dec  6 11:09:20 ns382633 sshd\[28164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109  user=root
Dec  6 11:09:22 ns382633 sshd\[28164\]: Failed password for root from 182.61.177.109 port 36998 ssh2
2019-12-06 20:17:46
45.119.212.14 attackspam
fail2ban honeypot
2019-12-06 20:07:32
120.71.145.189 attackbots
Dec  6 13:41:57 master sshd[12454]: Failed password for invalid user beckstead from 120.71.145.189 port 37539 ssh2
2019-12-06 20:01:03
217.238.181.182 attackspambots
Dec  6 03:01:18 fwservlet sshd[21735]: Invalid user http from 217.238.181.182
Dec  6 03:01:18 fwservlet sshd[21735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.238.181.182
Dec  6 03:01:20 fwservlet sshd[21735]: Failed password for invalid user http from 217.238.181.182 port 46116 ssh2
Dec  6 03:01:20 fwservlet sshd[21735]: Received disconnect from 217.238.181.182 port 46116:11: Bye Bye [preauth]
Dec  6 03:01:20 fwservlet sshd[21735]: Disconnected from 217.238.181.182 port 46116 [preauth]
Dec  6 03:08:26 fwservlet sshd[22059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.238.181.182  user=r.r
Dec  6 03:08:28 fwservlet sshd[22059]: Failed password for r.r from 217.238.181.182 port 55044 ssh2
Dec  6 03:08:28 fwservlet sshd[22059]: Received disconnect from 217.238.181.182 port 55044:11: Bye Bye [preauth]
Dec  6 03:08:28 fwservlet sshd[22059]: Disconnected from 217.238.181.182 por........
-------------------------------
2019-12-06 20:10:18
13.77.142.89 attackbotsspam
Dec  6 08:44:43 sd-53420 sshd\[30408\]: Invalid user uucpadm from 13.77.142.89
Dec  6 08:44:43 sd-53420 sshd\[30408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89
Dec  6 08:44:46 sd-53420 sshd\[30408\]: Failed password for invalid user uucpadm from 13.77.142.89 port 44394 ssh2
Dec  6 08:51:27 sd-53420 sshd\[31602\]: User root from 13.77.142.89 not allowed because none of user's groups are listed in AllowGroups
Dec  6 08:51:27 sd-53420 sshd\[31602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89  user=root
...
2019-12-06 20:33:33
218.78.46.81 attackspambots
Dec  6 08:29:21 hcbbdb sshd\[27592\]: Invalid user ackerson from 218.78.46.81
Dec  6 08:29:21 hcbbdb sshd\[27592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81
Dec  6 08:29:24 hcbbdb sshd\[27592\]: Failed password for invalid user ackerson from 218.78.46.81 port 42430 ssh2
Dec  6 08:36:32 hcbbdb sshd\[28436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81  user=root
Dec  6 08:36:34 hcbbdb sshd\[28436\]: Failed password for root from 218.78.46.81 port 44861 ssh2
2019-12-06 20:06:40
190.181.63.235 attackspambots
port scan and connect, tcp 22 (ssh)
2019-12-06 19:58:22
210.242.67.17 attackspambots
Dec  6 13:11:41 mail sshd[28183]: Failed password for root from 210.242.67.17 port 39922 ssh2
Dec  6 13:18:26 mail sshd[31340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.242.67.17 
Dec  6 13:18:28 mail sshd[31340]: Failed password for invalid user tuckwell from 210.242.67.17 port 59692 ssh2
2019-12-06 20:23:11
201.49.110.210 attack
2019-12-06T12:14:39.251537vps751288.ovh.net sshd\[20513\]: Invalid user joycelin from 201.49.110.210 port 35072
2019-12-06T12:14:39.264767vps751288.ovh.net sshd\[20513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.110.210
2019-12-06T12:14:41.372848vps751288.ovh.net sshd\[20513\]: Failed password for invalid user joycelin from 201.49.110.210 port 35072 ssh2
2019-12-06T12:21:21.676020vps751288.ovh.net sshd\[20563\]: Invalid user mysql from 201.49.110.210 port 46958
2019-12-06T12:21:21.689645vps751288.ovh.net sshd\[20563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.110.210
2019-12-06 19:58:00
195.112.232.219 attack
Unauthorised access (Dec  6) SRC=195.112.232.219 LEN=52 TTL=116 ID=5905 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-06 20:33:52
115.197.223.105 attackbotsspam
Automatic report - Port Scan Attack
2019-12-06 20:04:25
129.211.121.171 attackbotsspam
Dec  5 23:49:59 hpm sshd\[29227\]: Invalid user 123456 from 129.211.121.171
Dec  5 23:49:59 hpm sshd\[29227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.121.171
Dec  5 23:50:01 hpm sshd\[29227\]: Failed password for invalid user 123456 from 129.211.121.171 port 40908 ssh2
Dec  5 23:56:59 hpm sshd\[29859\]: Invalid user shusuke from 129.211.121.171
Dec  5 23:56:59 hpm sshd\[29859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.121.171
2019-12-06 20:04:08
134.175.102.175 attackbotsspam
Port scan on 1 port(s): 2376
2019-12-06 20:31:17
103.209.20.36 attackspambots
Dec  6 06:38:32 Tower sshd[24456]: Connection from 103.209.20.36 port 55514 on 192.168.10.220 port 22
Dec  6 06:38:34 Tower sshd[24456]: Failed password for root from 103.209.20.36 port 55514 ssh2
Dec  6 06:38:34 Tower sshd[24456]: Received disconnect from 103.209.20.36 port 55514:11: Bye Bye [preauth]
Dec  6 06:38:34 Tower sshd[24456]: Disconnected from authenticating user root 103.209.20.36 port 55514 [preauth]
2019-12-06 20:34:40
175.153.252.249 attackbotsspam
" "
2019-12-06 20:03:37

Recently Reported IPs

158.69.212.86 85.99.244.128 128.28.174.143 125.73.41.14
59.168.90.93 197.254.193.222 223.80.115.6 55.181.212.61
145.14.133.178 213.122.18.37 31.28.163.51 171.116.144.222
177.217.146.149 61.74.109.80 158.69.203.17 107.144.141.85
87.146.247.181 68.191.71.244 147.238.157.81 57.184.107.124