Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.145.94.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.145.94.97.			IN	A

;; AUTHORITY SECTION:
.			99	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041201 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 13 07:16:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 97.94.145.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.145.94.97.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
149.28.249.122 attackspam
Oct 13 09:08:53 dedicated sshd[1734]: Invalid user Windows@xp from 149.28.249.122 port 50062
2019-10-13 17:09:04
49.232.35.211 attackbots
Oct 13 09:09:43 vps691689 sshd[27738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.35.211
Oct 13 09:09:45 vps691689 sshd[27738]: Failed password for invalid user Manuel@123 from 49.232.35.211 port 42306 ssh2
...
2019-10-13 17:04:19
103.23.100.87 attack
2019-10-13T07:57:07.232923abusebot-2.cloudsearch.cf sshd\[25666\]: Invalid user Test123123 from 103.23.100.87 port 34105
2019-10-13 17:08:27
61.133.232.250 attack
Oct 13 10:45:04 sso sshd[20814]: Failed password for root from 61.133.232.250 port 22882 ssh2
...
2019-10-13 17:13:08
160.153.154.27 attack
Automatic report - XMLRPC Attack
2019-10-13 17:11:35
68.183.86.76 attackspambots
Oct 13 10:10:07 herz-der-gamer sshd[20235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.76  user=root
Oct 13 10:10:09 herz-der-gamer sshd[20235]: Failed password for root from 68.183.86.76 port 52016 ssh2
Oct 13 10:25:48 herz-der-gamer sshd[20487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.76  user=root
Oct 13 10:25:51 herz-der-gamer sshd[20487]: Failed password for root from 68.183.86.76 port 36356 ssh2
...
2019-10-13 17:05:03
149.129.124.66 attackspam
Automatic report - XMLRPC Attack
2019-10-13 17:24:24
222.186.190.92 attack
Oct 13 11:33:53 SilenceServices sshd[4235]: Failed password for root from 222.186.190.92 port 30832 ssh2
Oct 13 11:33:57 SilenceServices sshd[4235]: Failed password for root from 222.186.190.92 port 30832 ssh2
Oct 13 11:34:02 SilenceServices sshd[4235]: Failed password for root from 222.186.190.92 port 30832 ssh2
Oct 13 11:34:06 SilenceServices sshd[4235]: Failed password for root from 222.186.190.92 port 30832 ssh2
2019-10-13 17:36:08
95.174.219.101 attackbotsspam
Oct 13 10:21:52 vmanager6029 sshd\[7109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.174.219.101  user=root
Oct 13 10:21:53 vmanager6029 sshd\[7109\]: Failed password for root from 95.174.219.101 port 40274 ssh2
Oct 13 10:28:03 vmanager6029 sshd\[7218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.174.219.101  user=root
2019-10-13 17:21:04
121.142.111.86 attackspambots
2019-10-13T05:06:12.705718abusebot-5.cloudsearch.cf sshd\[1528\]: Invalid user bjorn from 121.142.111.86 port 46048
2019-10-13 17:18:56
164.132.81.106 attack
Oct 13 08:44:03 ns341937 sshd[18674]: Failed password for root from 164.132.81.106 port 34814 ssh2
Oct 13 08:51:23 ns341937 sshd[21263]: Failed password for root from 164.132.81.106 port 46984 ssh2
...
2019-10-13 17:22:41
92.63.194.47 attack
Oct 13 16:24:28 webhost01 sshd[4568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.47
Oct 13 16:24:29 webhost01 sshd[4568]: Failed password for invalid user admin from 92.63.194.47 port 35754 ssh2
...
2019-10-13 17:37:44
23.129.64.194 attackbots
$f2bV_matches
2019-10-13 17:33:24
121.142.111.222 attackspam
2019-10-13T09:04:02.355863abusebot-5.cloudsearch.cf sshd\[3778\]: Invalid user robert from 121.142.111.222 port 59552
2019-10-13 17:29:30
122.116.140.68 attackspambots
$f2bV_matches_ltvn
2019-10-13 17:05:28

Recently Reported IPs

63.59.101.26 19.101.140.74 29.12.5.109 243.16.21.20
82.8.118.50 185.144.137.66 63.138.43.172 254.255.136.121
83.164.65.207 161.221.95.5 124.72.27.97 129.43.96.93
51.227.82.172 119.1.83.198 107.85.74.138 178.114.198.215
185.183.71.223 213.8.199.8 189.97.185.94 160.6.72.89