Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.130.72.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.130.72.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020800 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 08 19:01:47 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 45.72.130.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.130.72.45.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
71.94.242.84 attackspambots
(sshd) Failed SSH login from 71.94.242.84 (US/United States/071-094-242-084.res.spectrum.com): 5 in the last 3600 secs
2020-08-07 13:44:28
173.212.205.123 attackspambots
SSH Brute Force
2020-08-07 13:28:19
172.93.4.78 attackspambots
Attempted to establish connection to non opened port 1057
2020-08-07 14:03:39
178.128.52.226 attack
Aug  7 07:19:10 ip40 sshd[18886]: Failed password for root from 178.128.52.226 port 55640 ssh2
...
2020-08-07 13:24:07
144.21.69.111 attack
Scanning an empty webserver with deny all robots.txt
2020-08-07 14:10:24
94.102.51.28 attackbotsspam
08/07/2020-01:15:06.318195 94.102.51.28 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-08-07 13:21:51
110.77.149.76 attackspam
(ftpd) Failed FTP login from 110.77.149.76 (TH/Thailand/-): 10 in the last 300 secs
2020-08-07 13:50:05
5.206.84.9 attackbots
SMTP Spam attack detected
2020-08-07 13:55:01
103.143.152.34 attack
20/8/6@23:57:27: FAIL: Alarm-Intrusion address from=103.143.152.34
...
2020-08-07 13:26:33
222.186.180.6 attackspam
Aug  7 02:51:55 firewall sshd[6523]: Failed password for root from 222.186.180.6 port 38758 ssh2
Aug  7 02:51:58 firewall sshd[6523]: Failed password for root from 222.186.180.6 port 38758 ssh2
Aug  7 02:52:01 firewall sshd[6523]: Failed password for root from 222.186.180.6 port 38758 ssh2
...
2020-08-07 13:57:57
174.138.42.143 attack
Aug  7 06:52:27 ovpn sshd\[32736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143  user=root
Aug  7 06:52:29 ovpn sshd\[32736\]: Failed password for root from 174.138.42.143 port 48568 ssh2
Aug  7 07:05:18 ovpn sshd\[5314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143  user=root
Aug  7 07:05:20 ovpn sshd\[5314\]: Failed password for root from 174.138.42.143 port 34304 ssh2
Aug  7 07:07:23 ovpn sshd\[6145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143  user=root
2020-08-07 13:17:39
94.181.181.120 attackspam
Aug  7 07:02:27 ip106 sshd[27852]: Failed password for root from 94.181.181.120 port 54002 ssh2
...
2020-08-07 14:08:38
167.71.224.129 attackbots
leo_www
2020-08-07 13:47:15
36.72.218.42 attack
Automatic report - Port Scan Attack
2020-08-07 13:42:40
120.9.211.59 attackbotsspam
Unauthorised access (Aug  7) SRC=120.9.211.59 LEN=40 TTL=46 ID=41831 TCP DPT=8080 WINDOW=6792 SYN 
Unauthorised access (Aug  4) SRC=120.9.211.59 LEN=40 TTL=46 ID=54163 TCP DPT=8080 WINDOW=49505 SYN 
Unauthorised access (Aug  3) SRC=120.9.211.59 LEN=40 TTL=46 ID=28594 TCP DPT=8080 WINDOW=49505 SYN
2020-08-07 13:45:27

Recently Reported IPs

239.99.214.177 250.28.135.244 9.199.172.50 221.179.230.221
51.30.82.82 229.69.244.252 215.233.104.174 167.232.214.69
135.67.58.155 214.157.190.49 61.158.110.173 143.180.156.29
33.141.49.150 58.165.88.171 55.123.177.37 230.207.203.220
67.107.53.50 109.181.58.209 147.215.182.55 234.153.155.177