Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.134.160.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.134.160.7.			IN	A

;; AUTHORITY SECTION:
.			447	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 10:35:02 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 7.160.134.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.134.160.7.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
49.234.88.160 attackspambots
Mar 27 19:01:02 minden010 sshd[27790]: Failed password for mail from 49.234.88.160 port 49718 ssh2
Mar 27 19:05:03 minden010 sshd[29346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.88.160
Mar 27 19:05:05 minden010 sshd[29346]: Failed password for invalid user vub from 49.234.88.160 port 44230 ssh2
...
2020-03-28 02:23:54
209.17.96.82 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 57a46b603c18f319 | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: ATL. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-03-28 02:16:09
106.12.96.23 attackbots
Mar 27 13:42:27 mout sshd[26377]: Invalid user wps from 106.12.96.23 port 44352
2020-03-28 01:58:06
92.63.194.107 attackspam
Fail2Ban Ban Triggered (2)
2020-03-28 01:58:57
106.12.72.156 attack
Mar 22 06:57:17 itv-usvr-01 sshd[25333]: Invalid user userftp from 106.12.72.156
Mar 22 06:57:17 itv-usvr-01 sshd[25333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.72.156
Mar 22 06:57:17 itv-usvr-01 sshd[25333]: Invalid user userftp from 106.12.72.156
Mar 22 06:57:19 itv-usvr-01 sshd[25333]: Failed password for invalid user userftp from 106.12.72.156 port 45054 ssh2
Mar 22 07:02:12 itv-usvr-01 sshd[25544]: Invalid user ryutaro from 106.12.72.156
2020-03-28 02:18:15
172.105.201.117 attackspam
1585318400 - 03/27/2020 21:13:20 Host: scan-16.security.ipip.net/172.105.201.117 Port: 23 TCP Blocked
...
2020-03-28 02:15:29
218.78.48.37 attack
Mar 27 17:05:59 jane sshd[17541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.48.37 
Mar 27 17:06:01 jane sshd[17541]: Failed password for invalid user ldv from 218.78.48.37 port 33144 ssh2
...
2020-03-28 01:47:03
158.69.5.181 attack
Time:     Fri Mar 27 09:12:07 2020 -0300
IP:       158.69.5.181 (CA/Canada/ip181.ip-158-69-5.net)
Failures: 15 (ftpd)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-03-28 02:17:01
106.12.84.63 attack
Invalid user nk from 106.12.84.63 port 41280
2020-03-28 02:09:20
129.211.65.70 attack
Mar 27 15:41:06 OPSO sshd\[7851\]: Invalid user fpe from 129.211.65.70 port 38320
Mar 27 15:41:06 OPSO sshd\[7851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.65.70
Mar 27 15:41:09 OPSO sshd\[7851\]: Failed password for invalid user fpe from 129.211.65.70 port 38320 ssh2
Mar 27 15:44:30 OPSO sshd\[8317\]: Invalid user grc from 129.211.65.70 port 48900
Mar 27 15:44:30 OPSO sshd\[8317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.65.70
2020-03-28 02:04:43
209.17.96.178 attackspambots
IP: 209.17.96.178
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 83%
Found in DNSBL('s)
ASN Details
   AS174 Cogent Communications
   United States (US)
   CIDR 209.17.96.0/20
Log Date: 27/03/2020 12:01:59 PM UTC
2020-03-28 02:24:48
181.110.240.194 attackbots
5x Failed Password
2020-03-28 02:25:07
106.12.74.141 attack
Mar 26 13:52:58 itv-usvr-01 sshd[2411]: Invalid user ifconfig from 106.12.74.141
Mar 26 13:52:58 itv-usvr-01 sshd[2411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.141
Mar 26 13:52:58 itv-usvr-01 sshd[2411]: Invalid user ifconfig from 106.12.74.141
Mar 26 13:53:00 itv-usvr-01 sshd[2411]: Failed password for invalid user ifconfig from 106.12.74.141 port 49592 ssh2
Mar 26 13:57:21 itv-usvr-01 sshd[2597]: Invalid user victoriano from 106.12.74.141
2020-03-28 02:14:50
106.124.137.108 attackbots
Invalid user bed from 106.124.137.108 port 34314
2020-03-28 01:55:40
188.6.161.77 attackbots
Mar 27 18:27:51 srv206 sshd[27192]: Invalid user xx from 188.6.161.77
Mar 27 18:27:51 srv206 sshd[27192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dslbc06a14d.fixip.t-online.hu
Mar 27 18:27:51 srv206 sshd[27192]: Invalid user xx from 188.6.161.77
Mar 27 18:27:53 srv206 sshd[27192]: Failed password for invalid user xx from 188.6.161.77 port 35490 ssh2
...
2020-03-28 02:00:16

Recently Reported IPs

66.201.221.224 73.81.101.145 178.6.4.139 219.128.232.113
70.112.179.154 239.51.81.121 121.31.245.202 146.86.127.3
146.86.127.125 52.176.39.101 104.216.102.49 64.252.156.216
232.102.54.247 119.229.50.116 194.73.232.46 46.109.58.151
131.99.249.158 143.224.124.142 175.22.202.244 145.34.125.31