Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.0.145.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.0.145.163.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 22:29:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 163.145.0.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.0.145.163.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
187.18.126.19 attackspam
Jul  9 00:21:42 mercury auth[21903]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=187.18.126.19
...
2019-09-10 23:54:25
119.116.52.76 attackbotsspam
" "
2019-09-10 23:30:43
122.224.175.218 attackspam
Sep 10 16:46:24 mout sshd[20356]: Invalid user vbox from 122.224.175.218 port 51869
2019-09-10 23:13:46
93.84.105.253 attack
Automatic report - Port Scan Attack
2019-09-11 00:44:37
142.93.69.223 attack
Sep 10 04:55:55 web1 sshd\[5226\]: Invalid user robot from 142.93.69.223
Sep 10 04:55:55 web1 sshd\[5226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.69.223
Sep 10 04:55:58 web1 sshd\[5226\]: Failed password for invalid user robot from 142.93.69.223 port 42212 ssh2
Sep 10 05:02:08 web1 sshd\[5809\]: Invalid user test from 142.93.69.223
Sep 10 05:02:08 web1 sshd\[5809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.69.223
2019-09-10 23:08:46
112.85.42.186 attackbotsspam
Sep 10 21:20:19 areeb-Workstation sshd[19707]: Failed password for root from 112.85.42.186 port 23294 ssh2
...
2019-09-10 23:52:53
186.227.166.154 attack
Unauthorized connection attempt from IP address 186.227.166.154 on Port 445(SMB)
2019-09-10 23:46:38
193.169.252.212 attackspam
Sep  3 09:52:25 mercury smtpd[1200]: 71c55265123430be smtp event=failed-command address=193.169.252.212 host=193.169.252.212 command="AUTH LOGIN" result="503 5.5.1 Invalid command: Command not supported"
...
2019-09-10 23:34:00
37.191.152.79 attack
09/10/2019-07:27:01.434179 37.191.152.79 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 29
2019-09-11 00:36:42
176.31.43.255 attack
Sep 10 18:24:03 markkoudstaal sshd[14540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.43.255
Sep 10 18:24:05 markkoudstaal sshd[14540]: Failed password for invalid user vncuser from 176.31.43.255 port 41306 ssh2
Sep 10 18:30:14 markkoudstaal sshd[15134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.43.255
2019-09-11 00:41:24
80.24.10.126 attackbotsspam
Unauthorized connection attempt from IP address 80.24.10.126 on Port 445(SMB)
2019-09-10 23:35:48
154.73.75.99 attackspam
Sep 10 15:55:26 hosting sshd[21337]: Invalid user dev from 154.73.75.99 port 55049
...
2019-09-10 23:55:18
125.46.76.99 attackbots
Sep 10 04:40:04 hpm sshd\[29270\]: Invalid user ts3 from 125.46.76.99
Sep 10 04:40:04 hpm sshd\[29270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.46.76.99
Sep 10 04:40:05 hpm sshd\[29270\]: Failed password for invalid user ts3 from 125.46.76.99 port 9018 ssh2
Sep 10 04:48:15 hpm sshd\[30161\]: Invalid user nagios from 125.46.76.99
Sep 10 04:48:15 hpm sshd\[30161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.46.76.99
2019-09-10 23:28:42
71.176.231.137 attackbots
Unauthorized connection attempt from IP address 71.176.231.137 on Port 445(SMB)
2019-09-11 00:29:53
162.144.43.123 attackspam
WordPress wp-login brute force :: 162.144.43.123 0.136 BYPASS [10/Sep/2019:21:28:45  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-10 23:21:07

Recently Reported IPs

202.20.180.16 188.4.228.104 12.212.161.40 57.246.182.96
178.205.189.32 184.81.94.53 129.60.141.214 223.82.112.199
23.175.64.192 106.33.160.167 69.101.81.105 33.110.81.193
224.183.8.63 138.93.36.28 210.7.191.172 217.213.61.98
198.143.143.132 220.40.13.105 115.58.174.248 170.52.226.131