Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.141.114.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20312
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.141.114.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 14:52:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 196.114.141.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.141.114.196.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.211.245.170 attack
Jul 25 01:09:45 ncomp postfix/smtpd[20934]: warning: unknown[185.211.245.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 01:09:59 ncomp postfix/smtpd[20934]: warning: unknown[185.211.245.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 01:11:29 ncomp postfix/smtpd[20934]: warning: unknown[185.211.245.170]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-25 07:34:00
162.243.144.247 attack
SPAM Delivery Attempt
2019-07-25 07:30:01
178.92.224.126 attackspambots
Unauthorized connection attempt from IP address 178.92.224.126 on Port 445(SMB)
2019-07-25 07:57:29
95.69.137.131 attackbotsspam
Honeypot hit.
2019-07-25 07:50:33
92.63.196.7 attack
RDP Bruteforce
2019-07-25 08:07:23
192.99.175.190 attackbots
Automatic report - Port Scan Attack
2019-07-25 07:31:36
168.0.83.193 attackspam
2019-07-24 23:34:56,239 fail2ban.actions        [16526]: NOTICE  [portsentry] Ban 168.0.83.193
...
2019-07-25 07:26:00
201.243.240.21 attackbots
Unauthorized connection attempt from IP address 201.243.240.21 on Port 445(SMB)
2019-07-25 08:04:04
14.241.75.17 attackbots
Unauthorized connection attempt from IP address 14.241.75.17 on Port 445(SMB)
2019-07-25 08:06:29
178.123.229.159 attackbots
Unauthorized connection attempt from IP address 178.123.229.159 on Port 445(SMB)
2019-07-25 08:10:11
51.38.150.105 attackbots
Jul 24 18:34:01 lnxmail61 sshd[19542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.150.105
Jul 24 18:34:02 lnxmail61 sshd[19542]: Failed password for invalid user admin from 51.38.150.105 port 59154 ssh2
Jul 24 18:34:05 lnxmail61 sshd[19542]: Failed password for invalid user admin from 51.38.150.105 port 59154 ssh2
Jul 24 18:34:07 lnxmail61 sshd[19542]: Failed password for invalid user admin from 51.38.150.105 port 59154 ssh2
2019-07-25 07:41:40
104.245.144.61 attackspambots
(From caleb.key78@gmail.com) Would you like to post your ad on 1000's of Advertising sites monthly? Pay one low monthly fee and get virtually unlimited traffic to your site forever!To find out more check out our site here: http://post1000sofads.webhop.me
2019-07-25 07:27:03
147.135.156.89 attackspam
SSH invalid-user multiple login try
2019-07-25 07:53:53
176.221.104.2 attackspam
Jul 24 10:33:34 mail postfix/postscreen[93611]: PREGREET 39 after 2.1 from [176.221.104.2]:60563: EHLO host-176-221-104-2.dynamic.mm.pl

...
2019-07-25 07:56:29
35.240.134.192 attackbotsspam
WordPress brute force
2019-07-25 07:32:51

Recently Reported IPs

88.78.158.37 186.58.230.92 180.2.190.57 53.145.250.179
57.190.15.91 200.151.185.72 29.79.120.120 232.155.45.155
235.36.209.9 174.102.146.208 44.245.22.162 115.49.205.202
227.194.139.162 175.141.126.158 109.184.94.131 117.14.204.196
216.220.187.149 82.38.148.87 94.150.21.157 166.181.196.113