Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.138.152.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.138.152.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 21:43:24 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 168.152.138.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.138.152.168.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
209.141.54.195 attack
Sep 18 22:39:19 icecube sshd[71350]: Failed password for root from 209.141.54.195 port 45907 ssh2
2020-09-19 07:07:37
34.77.211.30 attack
34.77.211.30 - - [18/Sep/2020:18:00:38 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Moz"
34.77.211.30 - - [18/Sep/2020:18:00:38 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Moz"
34.77.211.30 - - [18/Sep/2020:18:00:38 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Moz"
...
2020-09-19 07:23:41
118.89.160.141 attackbots
Failed password for root from 118.89.160.141 port 39714
2020-09-19 06:50:38
117.173.67.119 attackspam
Sep 18 23:02:16 rancher-0 sshd[128899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119  user=root
Sep 18 23:02:18 rancher-0 sshd[128899]: Failed password for root from 117.173.67.119 port 5053 ssh2
...
2020-09-19 06:55:53
114.35.5.160 attackspambots
Auto Detect Rule!
proto TCP (SYN), 114.35.5.160:22691->gjan.info:23, len 40
2020-09-19 07:20:35
155.94.144.75 attackspambots
Invalid user beau from 155.94.144.75 port 53120
2020-09-19 07:28:54
189.76.12.181 attack
Email rejected due to spam filtering
2020-09-19 06:55:24
192.3.247.10 attack
2020-09-19T01:02:47.970891n23.at sshd[1927043]: Failed password for root from 192.3.247.10 port 46958 ssh2
2020-09-19T01:06:18.248518n23.at sshd[1930093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.247.10  user=root
2020-09-19T01:06:20.283058n23.at sshd[1930093]: Failed password for root from 192.3.247.10 port 56316 ssh2
...
2020-09-19 07:21:56
79.35.158.213 attack
Listed on    zen-spamhaus also barracudaCentral and abuseat.org   / proto=6  .  srcport=54795  .  dstport=5555  .     (2860)
2020-09-19 07:26:58
116.75.195.231 attackspam
Auto Detect Rule!
proto TCP (SYN), 116.75.195.231:41943->gjan.info:23, len 40
2020-09-19 07:24:40
218.75.93.98 attack
Unauthorized connection attempt from IP address 218.75.93.98 on Port 445(SMB)
2020-09-19 07:03:32
187.3.118.21 attackspambots
Email rejected due to spam filtering
2020-09-19 07:04:28
213.184.249.95 attackspam
Invalid user admin from 213.184.249.95 port 50340
2020-09-19 07:19:37
51.83.74.126 attackspam
SSH bruteforce
2020-09-19 06:53:06
37.115.154.71 attack
Automatic report - Banned IP Access
2020-09-19 07:21:07

Recently Reported IPs

114.6.87.203 128.239.101.200 86.71.157.77 72.96.156.252
29.206.73.141 138.49.236.46 231.229.154.226 211.4.30.169
39.198.67.55 196.97.156.90 33.78.22.64 43.110.249.142
101.154.92.71 118.191.5.126 218.227.152.108 251.227.229.122
141.25.48.199 197.100.234.64 181.234.90.30 96.135.243.94