Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.119.145.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16806
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.119.145.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 13:47:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 34.145.119.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.119.145.34.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
70.63.181.58 attackspam
SSH Bruteforce
2019-11-17 20:12:50
153.37.22.155 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-11-17 20:03:14
82.64.25.207 attackspam
SSH Bruteforce
2019-11-17 19:54:11
83.15.183.137 attackspambots
SSH Bruteforce
2019-11-17 19:53:18
35.234.67.163 attackspambots
Automatic report - XMLRPC Attack
2019-11-17 20:02:11
90.84.45.38 attack
SSH Bruteforce
2019-11-17 19:40:46
178.62.33.222 attackbots
178.62.33.222 - - \[17/Nov/2019:08:14:50 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.62.33.222 - - \[17/Nov/2019:08:14:51 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-17 19:49:14
52.56.183.140 attackspam
52.56.183.140 - - \[17/Nov/2019:10:37:29 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
52.56.183.140 - - \[17/Nov/2019:10:37:30 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-17 19:36:10
219.239.105.55 attackbots
Nov 16 20:16:31 web9 sshd\[20587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.105.55  user=mysql
Nov 16 20:16:33 web9 sshd\[20587\]: Failed password for mysql from 219.239.105.55 port 40482 ssh2
Nov 16 20:22:21 web9 sshd\[21501\]: Invalid user pat from 219.239.105.55
Nov 16 20:22:21 web9 sshd\[21501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.105.55
Nov 16 20:22:23 web9 sshd\[21501\]: Failed password for invalid user pat from 219.239.105.55 port 57277 ssh2
2019-11-17 20:07:48
90.84.241.185 attackbots
SSH Bruteforce
2019-11-17 19:41:56
49.233.191.204 attackspam
Port scan detected on ports: 65530[TCP], 65530[TCP], 65530[TCP]
2019-11-17 20:12:39
115.159.203.90 attackspambots
Nov 17 14:29:42 webhost01 sshd[25132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.203.90
Nov 17 14:29:44 webhost01 sshd[25132]: Failed password for invalid user tumirah from 115.159.203.90 port 43668 ssh2
...
2019-11-17 19:34:04
159.89.13.0 attack
$f2bV_matches
2019-11-17 19:50:59
92.124.147.111 attack
SSH Bruteforce
2019-11-17 19:39:53
51.68.198.113 attackspam
SSH bruteforce (Triggered fail2ban)
2019-11-17 19:37:39

Recently Reported IPs

208.255.55.0 222.194.66.140 244.198.32.48 59.140.95.242
125.67.205.70 177.159.215.33 130.108.185.151 217.215.134.97
56.234.118.165 81.117.69.70 129.115.168.60 48.81.179.158
182.109.139.47 238.59.119.13 97.31.250.116 24.111.120.42
229.143.28.46 217.93.10.34 155.199.72.252 206.70.30.75