Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.134.213.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.134.213.229.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:06:27 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 229.213.134.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.134.213.229.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
67.217.160.101 attackbots
Port Scan: UDP/500
2019-09-10 19:12:01
80.211.83.105 attackbotsspam
Sep 10 13:30:37 icinga sshd[683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.83.105
Sep 10 13:30:39 icinga sshd[683]: Failed password for invalid user console from 80.211.83.105 port 34408 ssh2
...
2019-09-10 19:52:06
27.14.44.163 attackspambots
" "
2019-09-10 19:54:37
213.47.155.107 attackspambots
Jun 30 21:15:08 mercury smtpd[1186]: 46f2155b989ea795 smtp event=failed-command address=213.47.155.107 host=213-47-155-107.static.upcbusiness.at command="RCPT to:" result="550 Invalid recipient"
...
2019-09-10 19:58:44
173.54.193.242 attackbotsspam
May 21 21:25:15 mercury wordpress(lukegirvin.com)[3807]: XML-RPC authentication failure for luke from 173.54.193.242
...
2019-09-10 19:43:04
112.233.127.13 attackspambots
Port Scan: TCP/21
2019-09-10 19:04:08
128.77.29.135 attackspam
Sep 10 12:34:50 microserver sshd[51143]: Invalid user alexalex from 128.77.29.135 port 38612
Sep 10 12:34:50 microserver sshd[51143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.77.29.135
Sep 10 12:34:52 microserver sshd[51143]: Failed password for invalid user alexalex from 128.77.29.135 port 38612 ssh2
Sep 10 12:40:45 microserver sshd[52330]: Invalid user luser from 128.77.29.135 port 42978
Sep 10 12:40:45 microserver sshd[52330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.77.29.135
Sep 10 12:52:37 microserver sshd[53892]: Invalid user 123 from 128.77.29.135 port 51670
Sep 10 12:52:37 microserver sshd[53892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.77.29.135
Sep 10 12:52:39 microserver sshd[53892]: Failed password for invalid user 123 from 128.77.29.135 port 51670 ssh2
Sep 10 12:58:30 microserver sshd[54639]: Invalid user 123456 from 128.77.29.135 port 56018
Se
2019-09-10 19:43:35
218.255.77.38 attack
May 26 17:32:11 mercury smtpd[1000]: 36e5b6421b7b5731 smtp event=failed-command address=218.255.77.38 host=static.reserve.wtt.net.hk command="RCPT to:" result="550 Invalid recipient"
...
2019-09-10 19:44:37
222.186.15.160 attackspambots
Sep 10 01:44:07 web1 sshd\[19245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.160  user=root
Sep 10 01:44:09 web1 sshd\[19245\]: Failed password for root from 222.186.15.160 port 63830 ssh2
Sep 10 01:44:11 web1 sshd\[19245\]: Failed password for root from 222.186.15.160 port 63830 ssh2
Sep 10 01:44:13 web1 sshd\[19245\]: Failed password for root from 222.186.15.160 port 63830 ssh2
Sep 10 01:44:16 web1 sshd\[19255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.160  user=root
2019-09-10 19:50:15
113.189.235.57 attackspam
2019-08-28T05:10:57.990Z CLOSE host=113.189.235.57 port=59366 fd=6 time=960.184 bytes=1586
...
2019-09-10 19:44:02
41.208.70.187 attackbots
Port Scan: TCP/445
2019-09-10 19:14:08
64.90.3.202 attackspambots
Port Scan: UDP/137
2019-09-10 19:13:13
162.243.151.87 attackspam
Aug 22 15:59:32 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=162.243.151.87 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=UDP SPT=41554 DPT=123 LEN=56 
...
2019-09-10 19:51:02
211.220.27.191 attackbotsspam
F2B jail: sshd. Time: 2019-09-10 13:31:00, Reported by: VKReport
2019-09-10 19:33:42
174.75.238.76 attackspambots
Jul  9 08:31:43 mercury wordpress(lukegirvin.com)[31169]: XML-RPC authentication failure for luke from 174.75.238.76
...
2019-09-10 19:35:32

Recently Reported IPs

51.42.33.129 32.63.228.230 57.80.91.212 5.220.47.130
202.202.38.215 246.227.31.67 224.134.198.107 198.156.36.236
122.96.118.250 220.32.51.160 254.84.123.58 221.77.48.251
161.161.8.7 255.23.85.43 185.161.47.138 7.72.8.17
140.163.206.43 208.54.183.66 13.52.105.12 177.254.193.27