Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.55.2.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.55.2.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 19:53:04 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 154.2.55.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.2.55.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
74.14.102.20 attack
Honeypot attack, port: 5555, PTR: wndson1290w-lp130-04-74-14-102-20.dsl.bell.ca.
2020-01-13 15:56:58
117.247.232.136 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 15:40:06
147.50.15.14 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 16:09:54
60.168.128.2 attackbotsspam
no
2020-01-13 15:48:53
194.152.206.93 attack
Jan 13 06:53:33 srv-ubuntu-dev3 sshd[120589]: Invalid user winadmin from 194.152.206.93
Jan 13 06:53:33 srv-ubuntu-dev3 sshd[120589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93
Jan 13 06:53:33 srv-ubuntu-dev3 sshd[120589]: Invalid user winadmin from 194.152.206.93
Jan 13 06:53:35 srv-ubuntu-dev3 sshd[120589]: Failed password for invalid user winadmin from 194.152.206.93 port 54700 ssh2
Jan 13 06:56:30 srv-ubuntu-dev3 sshd[120855]: Invalid user dong from 194.152.206.93
Jan 13 06:56:30 srv-ubuntu-dev3 sshd[120855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93
Jan 13 06:56:30 srv-ubuntu-dev3 sshd[120855]: Invalid user dong from 194.152.206.93
Jan 13 06:56:33 srv-ubuntu-dev3 sshd[120855]: Failed password for invalid user dong from 194.152.206.93 port 37498 ssh2
Jan 13 06:59:23 srv-ubuntu-dev3 sshd[121141]: Invalid user leal from 194.152.206.93
...
2020-01-13 16:01:33
27.73.32.59 attackspam
Honeypot attack, port: 445, PTR: localhost.
2020-01-13 16:16:22
58.186.126.211 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 15:44:11
117.6.86.17 attackspambots
1578891053 - 01/13/2020 05:50:53 Host: 117.6.86.17/117.6.86.17 Port: 445 TCP Blocked
2020-01-13 16:10:15
123.124.21.254 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-01-13 16:08:51
2.179.199.174 attack
Automatic report - Port Scan Attack
2020-01-13 15:52:55
165.227.67.64 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.67.64  user=root
Failed password for root from 165.227.67.64 port 59902 ssh2
Invalid user blog from 165.227.67.64 port 51506
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.67.64
Failed password for invalid user blog from 165.227.67.64 port 51506 ssh2
2020-01-13 16:00:29
59.125.249.75 attackbots
unauthorized connection attempt
2020-01-13 15:36:41
14.162.202.33 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-01-13 16:06:58
58.82.207.169 attackspam
10 attempts against mh-pma-try-ban on snow.magehost.pro
2020-01-13 16:13:03
36.78.7.171 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 15:50:52

Recently Reported IPs

204.104.232.9 85.219.130.77 35.138.181.108 165.213.216.63
150.234.118.179 81.147.36.189 143.11.1.64 155.115.181.148
87.132.201.11 52.35.118.157 196.210.93.225 238.16.72.221
193.52.118.179 86.165.163.44 203.42.234.49 47.191.237.132
226.4.168.61 131.6.96.8 84.169.172.91 137.137.185.42