Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.112.45.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.112.45.136.			IN	A

;; AUTHORITY SECTION:
.			557	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 08:12:17 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 136.45.112.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.112.45.136.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.30 attack
Sep  6 04:19:24 ny01 sshd[18463]: Failed password for root from 112.85.42.30 port 46464 ssh2
Sep  6 04:21:11 ny01 sshd[18678]: Failed password for root from 112.85.42.30 port 18128 ssh2
2020-09-06 16:27:32
49.234.123.171 attackbots
Sep  6 08:56:17 santamaria sshd\[18623\]: Invalid user git from 49.234.123.171
Sep  6 08:56:17 santamaria sshd\[18623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.123.171
Sep  6 08:56:19 santamaria sshd\[18623\]: Failed password for invalid user git from 49.234.123.171 port 33686 ssh2
...
2020-09-06 16:19:34
125.76.246.102 attack
Unauthorized connection attempt from IP address 125.76.246.102 on Port 445(SMB)
2020-09-06 16:41:32
93.124.105.236 attackbots
Last visit 2020-09-05 11:55:56
2020-09-06 16:11:28
37.210.173.198 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 16:11:55
195.54.160.180 attack
SSH auth scanning - multiple failed logins
2020-09-06 16:25:48
121.32.46.29 attackspam
Attempted connection to port 445.
2020-09-06 16:43:07
5.39.44.17 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-06 16:44:30
68.183.51.204 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-06 16:18:57
180.93.230.211 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 16:24:02
103.152.244.254 attackspam
Attempted connection to port 445.
2020-09-06 16:44:11
222.85.139.140 attack
Sep  6 07:28:17 root sshd[13730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.85.139.140 
Sep  6 07:53:28 root sshd[996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.85.139.140 
...
2020-09-06 16:28:48
122.226.238.138 attack
 TCP (SYN) 122.226.238.138:42132 -> port 1433, len 44
2020-09-06 16:10:16
190.235.214.78 attackspam
failed attempts to access the website, searching for vulnerabilities, also using following IPs: 27.37.246.129 , 94.231.218.223 , 116.90.237.125 ,  190.235.214.78 ,  190.98.53.86 , 45.170.129.135 ,  170.239.242.222 , 43.249.113.243 ,  103.140.4.87 ,  171.103.190.158 , 72.210.252.135
2020-09-06 16:21:52
156.221.183.227 attack
Attempted connection to port 5501.
2020-09-06 16:40:02

Recently Reported IPs

228.187.16.205 210.155.10.110 240.34.65.8 114.13.106.241
109.177.27.253 70.196.68.243 99.31.173.113 97.66.46.106
237.242.220.95 236.24.100.242 235.163.119.139 228.94.133.160
207.92.226.49 213.223.189.218 83.16.78.192 1.225.201.232
15.92.56.171 133.25.61.104 159.180.121.30 230.181.158.251