Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.134.99.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.134.99.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025071901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 20 10:39:28 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 2.99.134.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.134.99.2.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
128.199.95.60 attack
Sep  5 10:05:15 lcprod sshd\[25568\]: Invalid user jenkins from 128.199.95.60
Sep  5 10:05:15 lcprod sshd\[25568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
Sep  5 10:05:17 lcprod sshd\[25568\]: Failed password for invalid user jenkins from 128.199.95.60 port 58864 ssh2
Sep  5 10:10:37 lcprod sshd\[26081\]: Invalid user test from 128.199.95.60
Sep  5 10:10:37 lcprod sshd\[26081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
2019-09-06 08:03:14
180.76.238.70 attack
Automatic report - Banned IP Access
2019-09-06 08:02:43
134.209.211.153 attack
www.goldgier.de 134.209.211.153 \[05/Sep/2019:23:00:03 +0200\] "POST /wp-login.php HTTP/1.1" 200 8728 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.goldgier.de 134.209.211.153 \[05/Sep/2019:23:00:06 +0200\] "POST /wp-login.php HTTP/1.1" 200 8727 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-06 07:49:34
165.227.165.98 attackbots
Sep  6 01:57:12 localhost sshd\[28307\]: Invalid user minecraft from 165.227.165.98 port 50702
Sep  6 01:57:12 localhost sshd\[28307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.165.98
Sep  6 01:57:14 localhost sshd\[28307\]: Failed password for invalid user minecraft from 165.227.165.98 port 50702 ssh2
2019-09-06 08:08:12
222.242.104.188 attackspambots
Sep  6 02:03:15 eventyay sshd[19877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.104.188
Sep  6 02:03:17 eventyay sshd[19877]: Failed password for invalid user 123 from 222.242.104.188 port 59523 ssh2
Sep  6 02:07:56 eventyay sshd[20000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.104.188
...
2019-09-06 08:17:53
89.179.118.84 attack
SSH Brute Force
2019-09-06 08:25:22
165.227.69.188 attackbots
Sep  5 22:27:32 web8 sshd\[30042\]: Invalid user ansibleuser from 165.227.69.188
Sep  5 22:27:32 web8 sshd\[30042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.69.188
Sep  5 22:27:34 web8 sshd\[30042\]: Failed password for invalid user ansibleuser from 165.227.69.188 port 48894 ssh2
Sep  5 22:31:54 web8 sshd\[32181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.69.188  user=mysql
Sep  5 22:31:56 web8 sshd\[32181\]: Failed password for mysql from 165.227.69.188 port 35276 ssh2
2019-09-06 07:52:26
91.211.217.178 attackbots
Unauthorized connection attempt from IP address 91.211.217.178 on Port 445(SMB)
2019-09-06 08:31:19
144.217.161.78 attackspam
Sep  5 21:00:40 SilenceServices sshd[19701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.161.78
Sep  5 21:00:43 SilenceServices sshd[19701]: Failed password for invalid user admin from 144.217.161.78 port 33696 ssh2
Sep  5 21:04:52 SilenceServices sshd[21233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.161.78
2019-09-06 08:12:33
185.168.173.121 attack
Automatic report - Port Scan Attack
2019-09-06 07:58:55
174.138.29.145 attackbots
Sep  5 23:42:42 MK-Soft-VM3 sshd\[3231\]: Invalid user ftp_user from 174.138.29.145 port 57232
Sep  5 23:42:42 MK-Soft-VM3 sshd\[3231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.29.145
Sep  5 23:42:44 MK-Soft-VM3 sshd\[3231\]: Failed password for invalid user ftp_user from 174.138.29.145 port 57232 ssh2
...
2019-09-06 08:13:04
203.143.12.26 attackbotsspam
Sep  5 20:59:06 v22019058497090703 sshd[22501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.143.12.26
Sep  5 20:59:08 v22019058497090703 sshd[22501]: Failed password for invalid user 123456 from 203.143.12.26 port 26323 ssh2
Sep  5 21:03:55 v22019058497090703 sshd[22836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.143.12.26
...
2019-09-06 08:06:57
207.154.192.152 attackbotsspam
2019-09-06T02:04:23.297050enmeeting.mahidol.ac.th sshd\[27946\]: Invalid user qwertyuiop from 207.154.192.152 port 33626
2019-09-06T02:04:23.310717enmeeting.mahidol.ac.th sshd\[27946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.192.152
2019-09-06T02:04:25.461411enmeeting.mahidol.ac.th sshd\[27946\]: Failed password for invalid user qwertyuiop from 207.154.192.152 port 33626 ssh2
...
2019-09-06 08:28:30
165.22.254.187 attack
Sep  5 11:43:16 sachi sshd\[29349\]: Invalid user qwerty321 from 165.22.254.187
Sep  5 11:43:16 sachi sshd\[29349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.254.187
Sep  5 11:43:18 sachi sshd\[29349\]: Failed password for invalid user qwerty321 from 165.22.254.187 port 39412 ssh2
Sep  5 11:47:55 sachi sshd\[29743\]: Invalid user smbguest from 165.22.254.187
Sep  5 11:47:55 sachi sshd\[29743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.254.187
2019-09-06 08:22:16
67.229.129.194 attackspam
Unauthorized connection attempt from IP address 67.229.129.194 on Port 445(SMB)
2019-09-06 07:55:30

Recently Reported IPs

123.180.121.193 223.153.76.83 28.34.35.196 108.221.136.158
8.90.128.169 171.249.68.137 42.149.52.71 75.253.192.74
104.248.129.250 4.101.100.250 218.80.126.219 164.92.163.145
46.101.198.27 165.232.73.24 134.122.77.16 66.153.241.248
66.153.241.226 20.65.193.148 107.22.137.206 36.124.218.201