Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.144.42.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.144.42.221.			IN	A

;; AUTHORITY SECTION:
.			294	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 12:35:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 221.42.144.55.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 55.144.42.221.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
178.170.219.6 attackspam
(RCPT) RCPT NOT ALLOWED FROM  178.170.219.6 (RU/Russia/-): 1 in the last 3600 secs
2020-09-16 23:44:17
186.206.129.160 attackspam
SSH Brute-Force reported by Fail2Ban
2020-09-16 23:25:32
222.141.25.30 attack
Port Scan
...
2020-09-16 23:43:03
94.25.182.114 attackspambots
1600189176 - 09/15/2020 18:59:36 Host: 94.25.182.114/94.25.182.114 Port: 445 TCP Blocked
2020-09-16 23:23:12
141.101.69.235 attack
SSH Bruteforce attempt
2020-09-16 23:30:40
165.22.101.43 attack
Invalid user adsl from 165.22.101.43 port 49294
2020-09-16 23:18:43
173.231.59.214 attackbots
Brute force attack stopped by firewall
2020-09-16 23:41:01
49.234.91.78 attackbotsspam
Sep 16 16:00:31 marvibiene sshd[8678]: Failed password for root from 49.234.91.78 port 38866 ssh2
Sep 16 16:20:22 marvibiene sshd[10089]: Failed password for root from 49.234.91.78 port 36102 ssh2
2020-09-16 23:34:58
200.73.131.100 attack
SSH brute-force attempt
2020-09-16 23:24:14
68.183.64.176 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-09-16 23:07:13
121.46.26.126 attack
Invalid user dantoy23 from 121.46.26.126 port 39430
2020-09-16 23:34:13
190.39.12.72 attackspambots
Unauthorized connection attempt from IP address 190.39.12.72 on Port 445(SMB)
2020-09-16 23:37:01
165.22.215.192 attack
Invalid user rosenblum from 165.22.215.192 port 50804
2020-09-16 23:35:40
180.76.57.58 attackspambots
Sep 16 17:00:35 ip106 sshd[13427]: Failed password for root from 180.76.57.58 port 35432 ssh2
...
2020-09-16 23:16:24
139.198.17.31 attack
Sep 16 18:03:43 itv-usvr-01 sshd[19686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.17.31  user=root
Sep 16 18:03:45 itv-usvr-01 sshd[19686]: Failed password for root from 139.198.17.31 port 52818 ssh2
Sep 16 18:06:54 itv-usvr-01 sshd[19810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.17.31  user=root
Sep 16 18:06:56 itv-usvr-01 sshd[19810]: Failed password for root from 139.198.17.31 port 58880 ssh2
Sep 16 18:10:08 itv-usvr-01 sshd[20044]: Invalid user uftp from 139.198.17.31
2020-09-16 23:37:58

Recently Reported IPs

34.25.120.121 71.191.125.115 154.234.114.149 89.104.223.171
227.94.121.91 13.0.108.172 15.165.228.59 40.187.8.152
249.175.166.187 63.99.226.39 16.137.212.139 49.69.31.0
10.47.87.119 197.161.49.159 160.90.108.185 252.72.132.55
220.244.159.198 53.242.90.135 169.235.64.204 31.144.50.203