Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Charlotte

Region: North Carolina

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.149.31.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;55.149.31.217.			IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060101 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 02 01:47:23 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 217.31.149.55.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 217.31.149.55.in-addr.arpa.: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
138.197.151.129 attackspambots
Invalid user demo from 138.197.151.129 port 43802
2020-05-01 13:10:38
123.207.97.250 attack
Invalid user shell from 123.207.97.250 port 47466
2020-05-01 13:11:45
202.149.89.84 attack
Invalid user loya from 202.149.89.84 port 43505
2020-05-01 13:25:48
187.141.128.42 attackbotsspam
May  1 07:01:14 home sshd[24172]: Failed password for root from 187.141.128.42 port 39744 ssh2
May  1 07:04:18 home sshd[24681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.128.42
May  1 07:04:20 home sshd[24681]: Failed password for invalid user temp1 from 187.141.128.42 port 39844 ssh2
...
2020-05-01 13:05:45
49.236.203.163 attack
Invalid user postgres from 49.236.203.163 port 53994
2020-05-01 13:19:57
115.159.65.195 attackbotsspam
Invalid user knn from 115.159.65.195 port 41252
2020-05-01 13:43:28
118.24.197.247 attackspambots
Invalid user sinus from 118.24.197.247 port 38958
2020-05-01 13:14:02
201.49.127.212 attack
Invalid user csgo from 201.49.127.212 port 36050
2020-05-01 13:04:36
112.3.30.78 attackbotsspam
Invalid user student4 from 112.3.30.78 port 55046
2020-05-01 13:14:26
90.90.165.117 attackspam
$f2bV_matches
2020-05-01 13:50:46
186.235.60.18 attack
Invalid user test from 186.235.60.18 port 39280
2020-05-01 13:06:18
111.229.46.2 attackbotsspam
Invalid user jd from 111.229.46.2 port 36724
2020-05-01 13:45:55
118.101.192.81 attackbotsspam
Invalid user ankit from 118.101.192.81 port 15143
2020-05-01 13:13:25
159.89.171.121 attackspambots
ssh brute force
2020-05-01 13:09:12
159.65.30.66 attackbotsspam
Invalid user su from 159.65.30.66 port 60252
2020-05-01 13:09:34

Recently Reported IPs

185.132.251.230 159.6.176.246 137.10.111.195 44.188.241.55
112.211.10.165 117.234.210.120 103.230.49.143 65.227.32.218
140.51.13.46 1.23.39.226 156.34.118.26 177.32.34.125
156.225.68.99 107.225.64.99 90.91.37.34 211.249.234.85
216.189.136.231 110.241.215.66 45.127.34.228 146.11.123.185