Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.142.18.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.142.18.189.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:13:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 189.18.142.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.142.18.189.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.85.234.215 attack
2019-09-20T21:26:48.370758abusebot-5.cloudsearch.cf sshd\[17336\]: Invalid user ovh from 190.85.234.215 port 56504
2019-09-21 05:58:15
218.92.0.133 attackbotsspam
Sep 20 11:15:39 hanapaa sshd\[5506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Sep 20 11:15:41 hanapaa sshd\[5506\]: Failed password for root from 218.92.0.133 port 19315 ssh2
Sep 20 11:15:56 hanapaa sshd\[5590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Sep 20 11:15:57 hanapaa sshd\[5590\]: Failed password for root from 218.92.0.133 port 61875 ssh2
Sep 20 11:16:13 hanapaa sshd\[5608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2019-09-21 06:08:07
95.123.194.76 attackspam
" "
2019-09-21 06:33:33
217.182.253.230 attackspambots
2019-09-20T22:18:10.023097abusebot-4.cloudsearch.cf sshd\[12282\]: Invalid user fz from 217.182.253.230 port 36988
2019-09-21 06:30:04
182.61.55.239 attackspambots
[ssh] SSH attack
2019-09-21 06:34:18
49.234.86.229 attackbots
2019-09-20T21:50:17.810570abusebot-4.cloudsearch.cf sshd\[12144\]: Invalid user heroin from 49.234.86.229 port 39826
2019-09-21 06:06:48
117.211.94.250 attack
Sep 20 23:41:33 vps691689 sshd[29966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.94.250
Sep 20 23:41:35 vps691689 sshd[29966]: Failed password for invalid user qj from 117.211.94.250 port 52446 ssh2
...
2019-09-21 05:58:40
165.22.78.222 attackspambots
Sep 21 03:07:54 areeb-Workstation sshd[32717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.78.222
Sep 21 03:07:56 areeb-Workstation sshd[32717]: Failed password for invalid user pwrchute from 165.22.78.222 port 52830 ssh2
...
2019-09-21 05:59:50
185.207.232.232 attackspambots
Sep 20 12:18:31 hpm sshd\[6355\]: Invalid user ss from 185.207.232.232
Sep 20 12:18:31 hpm sshd\[6355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.207.232.232
Sep 20 12:18:34 hpm sshd\[6355\]: Failed password for invalid user ss from 185.207.232.232 port 38170 ssh2
Sep 20 12:22:57 hpm sshd\[6936\]: Invalid user nsroot from 185.207.232.232
Sep 20 12:22:57 hpm sshd\[6936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.207.232.232
2019-09-21 06:32:10
222.186.15.101 attack
Sep 20 12:21:57 web1 sshd\[4440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
Sep 20 12:21:59 web1 sshd\[4440\]: Failed password for root from 222.186.15.101 port 60972 ssh2
Sep 20 12:22:02 web1 sshd\[4440\]: Failed password for root from 222.186.15.101 port 60972 ssh2
Sep 20 12:22:04 web1 sshd\[4440\]: Failed password for root from 222.186.15.101 port 60972 ssh2
Sep 20 12:25:01 web1 sshd\[4888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
2019-09-21 06:31:17
45.142.195.5 attackbots
Sep 20 23:51:31 web1 postfix/smtpd\[1756\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 23:52:32 web1 postfix/smtpd\[1756\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 23:53:32 web1 postfix/smtpd\[1756\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-21 05:53:44
51.83.78.56 attackspam
Sep 20 23:56:31 localhost sshd\[661\]: Invalid user yanny from 51.83.78.56 port 35612
Sep 20 23:56:31 localhost sshd\[661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.56
Sep 20 23:56:33 localhost sshd\[661\]: Failed password for invalid user yanny from 51.83.78.56 port 35612 ssh2
2019-09-21 06:02:36
119.148.4.187 attack
Sep 21 02:58:49 areeb-Workstation sshd[32203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.148.4.187
Sep 21 02:58:50 areeb-Workstation sshd[32203]: Failed password for invalid user qnlkOF2NV7 from 119.148.4.187 port 2156 ssh2
...
2019-09-21 06:22:42
103.221.252.46 attack
Sep 20 16:58:01 vtv3 sshd\[27916\]: Invalid user maximilian from 103.221.252.46 port 50514
Sep 20 16:58:01 vtv3 sshd\[27916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46
Sep 20 16:58:03 vtv3 sshd\[27916\]: Failed password for invalid user maximilian from 103.221.252.46 port 50514 ssh2
Sep 20 17:02:55 vtv3 sshd\[30388\]: Invalid user nicola from 103.221.252.46 port 32944
Sep 20 17:02:55 vtv3 sshd\[30388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46
Sep 20 17:17:27 vtv3 sshd\[6057\]: Invalid user taskrabbit from 103.221.252.46 port 36696
Sep 20 17:17:27 vtv3 sshd\[6057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46
Sep 20 17:17:29 vtv3 sshd\[6057\]: Failed password for invalid user taskrabbit from 103.221.252.46 port 36696 ssh2
Sep 20 17:22:27 vtv3 sshd\[8621\]: Invalid user anastacia from 103.221.252.46 port 47352
Sep 20 17:2
2019-09-21 06:06:19
194.219.126.110 attack
Sep 21 03:12:12 areeb-Workstation sshd[561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.219.126.110
Sep 21 03:12:14 areeb-Workstation sshd[561]: Failed password for invalid user suporte from 194.219.126.110 port 57104 ssh2
...
2019-09-21 05:54:39

Recently Reported IPs

76.79.100.36 73.105.135.224 188.53.125.135 171.140.19.114
249.108.87.248 163.115.41.123 81.167.124.40 245.163.32.244
123.248.177.51 43.103.216.174 94.133.149.27 34.238.245.146
8.173.212.71 207.220.20.182 133.150.95.139 26.254.54.103
35.70.239.113 194.182.244.36 21.251.59.173 128.50.124.18