Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.55.70.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.55.70.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 18:47:26 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 42.70.55.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.70.55.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.236.168.35 attackbotsspam
20 attempts against mh-ssh on echoip
2020-03-04 07:52:03
106.13.233.178 attack
Mar  4 04:29:40 gw1 sshd[4224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.178
Mar  4 04:29:42 gw1 sshd[4224]: Failed password for invalid user root2 from 106.13.233.178 port 54412 ssh2
...
2020-03-04 07:54:48
45.151.254.218 attackbots
03/03/2020-19:07:15.937064 45.151.254.218 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)
2020-03-04 08:16:37
54.38.242.206 attackbots
Mar  4 00:04:29 ns382633 sshd\[11021\]: Invalid user trung from 54.38.242.206 port 60740
Mar  4 00:04:29 ns382633 sshd\[11021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.206
Mar  4 00:04:31 ns382633 sshd\[11021\]: Failed password for invalid user trung from 54.38.242.206 port 60740 ssh2
Mar  4 00:31:16 ns382633 sshd\[16507\]: Invalid user gitlab-psql from 54.38.242.206 port 42606
Mar  4 00:31:16 ns382633 sshd\[16507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.206
2020-03-04 07:35:22
165.22.92.109 attackspam
Mar  4 01:49:26 ift sshd\[15709\]: Invalid user view from 165.22.92.109Mar  4 01:49:27 ift sshd\[15709\]: Failed password for invalid user view from 165.22.92.109 port 57660 ssh2Mar  4 01:52:51 ift sshd\[16093\]: Invalid user view from 165.22.92.109Mar  4 01:52:54 ift sshd\[16093\]: Failed password for invalid user view from 165.22.92.109 port 55428 ssh2Mar  4 01:56:16 ift sshd\[16640\]: Invalid user oracle from 165.22.92.109
...
2020-03-04 08:05:59
112.169.255.1 attack
Mar  3 20:14:03 firewall sshd[16170]: Invalid user ashish from 112.169.255.1
Mar  3 20:14:05 firewall sshd[16170]: Failed password for invalid user ashish from 112.169.255.1 port 54386 ssh2
Mar  3 20:23:22 firewall sshd[16485]: Invalid user nx from 112.169.255.1
...
2020-03-04 07:54:15
61.84.196.50 attackspam
SSH-BruteForce
2020-03-04 07:48:13
111.229.219.7 attackbotsspam
Mar  3 12:40:21 wbs sshd\[7244\]: Invalid user user from 111.229.219.7
Mar  3 12:40:21 wbs sshd\[7244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.219.7
Mar  3 12:40:23 wbs sshd\[7244\]: Failed password for invalid user user from 111.229.219.7 port 49888 ssh2
Mar  3 12:46:14 wbs sshd\[7788\]: Invalid user royalhawaiianumbrella-finder from 111.229.219.7
Mar  3 12:46:14 wbs sshd\[7788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.219.7
2020-03-04 07:47:44
218.92.0.190 attackbots
03/03/2020-19:17:37.380858 218.92.0.190 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-04 08:17:45
144.91.120.73 attack
Detected By Fail2ban
2020-03-04 07:45:07
181.44.188.117 attackspambots
Lines containing failures of 181.44.188.117
Mar  3 23:38:57 shared11 sshd[11202]: Invalid user admin from 181.44.188.117 port 53335
Mar  3 23:38:57 shared11 sshd[11202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.44.188.117
Mar  3 23:38:59 shared11 sshd[11202]: Failed password for invalid user admin from 181.44.188.117 port 53335 ssh2
Mar  3 23:38:59 shared11 sshd[11202]: Connection closed by invalid user admin 181.44.188.117 port 53335 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.44.188.117
2020-03-04 08:05:23
209.141.62.246 attackbots
Automatic report - Banned IP Access
2020-03-04 07:40:41
150.109.183.88 attackspambots
(sshd) Failed SSH login from 150.109.183.88 (TH/Thailand/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  3 22:35:32 amsweb01 sshd[26498]: Invalid user ronjones from 150.109.183.88 port 32786
Mar  3 22:35:34 amsweb01 sshd[26498]: Failed password for invalid user ronjones from 150.109.183.88 port 32786 ssh2
Mar  3 22:46:39 amsweb01 sshd[28674]: Invalid user dongtingting from 150.109.183.88 port 38378
Mar  3 22:46:40 amsweb01 sshd[28674]: Failed password for invalid user dongtingting from 150.109.183.88 port 38378 ssh2
Mar  3 23:08:59 amsweb01 sshd[1299]: Invalid user ircbot from 150.109.183.88 port 49560
2020-03-04 07:42:27
223.71.139.99 attackbotsspam
Mar  3 23:09:09 lnxded64 sshd[19059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.99
2020-03-04 07:37:51
201.73.143.60 attack
Mar  4 00:30:31 vps647732 sshd[10780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.73.143.60
Mar  4 00:30:33 vps647732 sshd[10780]: Failed password for invalid user bitbucket from 201.73.143.60 port 51292 ssh2
...
2020-03-04 07:41:08

Recently Reported IPs

247.156.106.71 180.114.199.159 5.106.121.225 98.217.44.43
130.240.132.1 12.14.195.50 123.92.59.117 166.122.232.172
216.10.111.55 135.146.171.11 245.20.244.37 59.15.26.255
121.180.17.193 135.136.33.22 31.243.58.21 66.240.211.9
117.197.64.89 13.12.227.236 197.22.242.220 234.199.96.241