Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.1.228.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.1.228.69.			IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023022100 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 22 01:14:11 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 69.228.1.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.1.228.69.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
197.248.16.118 attackbots
Oct 28 13:43:51 MK-Soft-VM3 sshd[20607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118 
Oct 28 13:43:52 MK-Soft-VM3 sshd[20607]: Failed password for invalid user corine from 197.248.16.118 port 48178 ssh2
...
2019-10-28 20:44:33
64.187.167.174 attackbots
Unauthorised access (Oct 28) SRC=64.187.167.174 LEN=40 TTL=47 ID=20835 TCP DPT=8080 WINDOW=3019 SYN
2019-10-28 21:00:57
106.13.117.96 attackspam
Oct 28 13:37:36 eventyay sshd[16945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.117.96
Oct 28 13:37:38 eventyay sshd[16945]: Failed password for invalid user qiongyao from 106.13.117.96 port 52914 ssh2
Oct 28 13:43:16 eventyay sshd[17050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.117.96
...
2019-10-28 20:50:32
181.211.245.74 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-28 21:00:37
183.111.227.5 attackbotsspam
Oct 28 13:29:02 vmd17057 sshd\[21963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5  user=root
Oct 28 13:29:04 vmd17057 sshd\[21963\]: Failed password for root from 183.111.227.5 port 48064 ssh2
Oct 28 13:34:25 vmd17057 sshd\[22306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5  user=root
...
2019-10-28 21:02:58
132.148.129.180 attackspambots
Oct 28 03:20:37 Ubuntu-1404-trusty-64-minimal sshd\[24557\]: Invalid user zimbra from 132.148.129.180
Oct 28 03:20:37 Ubuntu-1404-trusty-64-minimal sshd\[24557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.129.180
Oct 28 03:20:39 Ubuntu-1404-trusty-64-minimal sshd\[24557\]: Failed password for invalid user zimbra from 132.148.129.180 port 46446 ssh2
Oct 28 12:59:44 Ubuntu-1404-trusty-64-minimal sshd\[32072\]: Invalid user usuario from 132.148.129.180
Oct 28 12:59:44 Ubuntu-1404-trusty-64-minimal sshd\[32072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.129.180
2019-10-28 20:31:25
182.34.192.26 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-28 20:39:44
116.211.118.249 attackspam
Unauthorised access (Oct 28) SRC=116.211.118.249 LEN=40 TOS=0x10 PREC=0x40 TTL=48 ID=62792 TCP DPT=23 WINDOW=16137 SYN
2019-10-28 20:34:03
45.224.126.168 attackbotsspam
Oct 28 13:24:53 ns381471 sshd[19929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.126.168
Oct 28 13:24:55 ns381471 sshd[19929]: Failed password for invalid user 1qaz2wsx from 45.224.126.168 port 49707 ssh2
2019-10-28 20:49:24
203.213.82.49 attackspam
28.10.2019 12:53:16 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2019-10-28 21:10:37
118.24.28.39 attack
(sshd) Failed SSH login from 118.24.28.39 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 28 12:31:22 server2 sshd[16789]: Invalid user elconix from 118.24.28.39 port 51364
Oct 28 12:31:24 server2 sshd[16789]: Failed password for invalid user elconix from 118.24.28.39 port 51364 ssh2
Oct 28 12:48:31 server2 sshd[17259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.28.39  user=root
Oct 28 12:48:34 server2 sshd[17259]: Failed password for root from 118.24.28.39 port 59626 ssh2
Oct 28 12:53:25 server2 sshd[17425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.28.39  user=root
2019-10-28 20:53:27
140.143.58.46 attack
Oct 28 02:38:52 php1 sshd\[22620\]: Invalid user corinna123 from 140.143.58.46
Oct 28 02:38:52 php1 sshd\[22620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.58.46
Oct 28 02:38:54 php1 sshd\[22620\]: Failed password for invalid user corinna123 from 140.143.58.46 port 46066 ssh2
Oct 28 02:44:58 php1 sshd\[23249\]: Invalid user sipwise from 140.143.58.46
Oct 28 02:44:58 php1 sshd\[23249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.58.46
2019-10-28 20:58:16
151.63.137.215 attack
" "
2019-10-28 20:54:10
222.186.173.215 attackspam
Oct 28 14:02:40 arianus sshd\[28832\]: Unable to negotiate with 222.186.173.215 port 7172: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\]
...
2019-10-28 21:06:11
116.203.143.246 attackspambots
Tried to access phpmyadmin
2019-10-28 20:50:02

Recently Reported IPs

93.166.121.118 89.150.149.132 8.131.60.240 52.24.157.163
135.180.199.157 214.65.218.119 254.239.89.128 197.142.247.60
9.171.207.238 171.246.39.169 165.227.90.138 195.177.98.75
66.21.249.254 162.247.153.86 7.117.10.80 103.83.158.144
103.83.158.137 147.78.47.159 229.176.89.35 17.24.215.44