Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.149.91.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.149.91.218.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 00:50:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 218.91.149.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.149.91.218.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
176.117.64.48 attackbotsspam
3389BruteforceFW22
2019-12-02 14:18:00
216.218.206.107 attackspam
firewall-block, port(s): 111/udp
2019-12-02 13:50:54
120.197.50.154 attackspambots
Dec  1 19:51:19 php1 sshd\[25192\]: Invalid user rpm from 120.197.50.154
Dec  1 19:51:19 php1 sshd\[25192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.gzsolartech.com
Dec  1 19:51:21 php1 sshd\[25192\]: Failed password for invalid user rpm from 120.197.50.154 port 40594 ssh2
Dec  1 19:57:40 php1 sshd\[26033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.gzsolartech.com  user=news
Dec  1 19:57:42 php1 sshd\[26033\]: Failed password for news from 120.197.50.154 port 42724 ssh2
2019-12-02 14:04:17
134.209.207.98 attackbots
UTC: 2019-12-01 port: 23/tcp
2019-12-02 14:21:03
106.246.250.202 attackbots
Dec  2 12:39:08 webhost01 sshd[31210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.246.250.202
Dec  2 12:39:09 webhost01 sshd[31210]: Failed password for invalid user ioanpaul from 106.246.250.202 port 53561 ssh2
...
2019-12-02 14:10:11
170.79.14.18 attackbotsspam
Dec  2 06:38:52 MK-Soft-VM8 sshd[13786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.79.14.18 
Dec  2 06:38:54 MK-Soft-VM8 sshd[13786]: Failed password for invalid user gottschall from 170.79.14.18 port 60626 ssh2
...
2019-12-02 13:59:59
163.172.84.50 attackbotsspam
Dec  2 00:51:06 linuxvps sshd\[52372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.84.50  user=uucp
Dec  2 00:51:09 linuxvps sshd\[52372\]: Failed password for uucp from 163.172.84.50 port 58028 ssh2
Dec  2 00:57:01 linuxvps sshd\[56093\]: Invalid user test from 163.172.84.50
Dec  2 00:57:01 linuxvps sshd\[56093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.84.50
Dec  2 00:57:03 linuxvps sshd\[56093\]: Failed password for invalid user test from 163.172.84.50 port 35644 ssh2
2019-12-02 14:01:31
117.50.97.216 attack
Dec  2 06:39:01 ArkNodeAT sshd\[31220\]: Invalid user sales from 117.50.97.216
Dec  2 06:39:01 ArkNodeAT sshd\[31220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.97.216
Dec  2 06:39:04 ArkNodeAT sshd\[31220\]: Failed password for invalid user sales from 117.50.97.216 port 51470 ssh2
2019-12-02 13:47:50
122.5.46.22 attackspam
Dec  2 06:44:39 eventyay sshd[26548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.5.46.22
Dec  2 06:44:41 eventyay sshd[26548]: Failed password for invalid user 123456 from 122.5.46.22 port 58126 ssh2
Dec  2 06:54:36 eventyay sshd[26758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.5.46.22
...
2019-12-02 14:09:39
54.39.138.251 attack
Invalid user monica from 54.39.138.251 port 54850
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.138.251
Failed password for invalid user monica from 54.39.138.251 port 54850 ssh2
Invalid user beirne from 54.39.138.251 port 38360
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.138.251
2019-12-02 13:55:25
118.25.152.227 attackspam
Dec  2 06:32:06 vps666546 sshd\[30170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.227  user=root
Dec  2 06:32:08 vps666546 sshd\[30170\]: Failed password for root from 118.25.152.227 port 38051 ssh2
Dec  2 06:39:06 vps666546 sshd\[30416\]: Invalid user http from 118.25.152.227 port 41231
Dec  2 06:39:06 vps666546 sshd\[30416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.227
Dec  2 06:39:08 vps666546 sshd\[30416\]: Failed password for invalid user http from 118.25.152.227 port 41231 ssh2
...
2019-12-02 13:42:14
94.23.24.213 attackspambots
2019-12-02T05:33:32.517567shield sshd\[10530\]: Invalid user bocciolini from 94.23.24.213 port 44004
2019-12-02T05:33:32.522134shield sshd\[10530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns367352.ip-94-23-24.eu
2019-12-02T05:33:35.013363shield sshd\[10530\]: Failed password for invalid user bocciolini from 94.23.24.213 port 44004 ssh2
2019-12-02T05:39:04.735949shield sshd\[12022\]: Invalid user whatweb from 94.23.24.213 port 57136
2019-12-02T05:39:04.740894shield sshd\[12022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns367352.ip-94-23-24.eu
2019-12-02 13:48:29
65.98.111.218 attackbotsspam
Dec  2 06:24:54 sd-53420 sshd\[18020\]: User root from 65.98.111.218 not allowed because none of user's groups are listed in AllowGroups
Dec  2 06:24:54 sd-53420 sshd\[18020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.98.111.218  user=root
Dec  2 06:24:56 sd-53420 sshd\[18020\]: Failed password for invalid user root from 65.98.111.218 port 44090 ssh2
Dec  2 06:30:20 sd-53420 sshd\[19005\]: User root from 65.98.111.218 not allowed because none of user's groups are listed in AllowGroups
Dec  2 06:30:20 sd-53420 sshd\[19005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.98.111.218  user=root
...
2019-12-02 13:37:35
218.238.9.89 attackspam
UTC: 2019-12-01 port: 123/udp
2019-12-02 13:58:55
222.186.175.182 attack
2019-12-02T06:22:23.940670shield sshd\[20725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-12-02T06:22:25.801963shield sshd\[20725\]: Failed password for root from 222.186.175.182 port 60912 ssh2
2019-12-02T06:22:28.813518shield sshd\[20725\]: Failed password for root from 222.186.175.182 port 60912 ssh2
2019-12-02T06:22:32.764876shield sshd\[20725\]: Failed password for root from 222.186.175.182 port 60912 ssh2
2019-12-02T06:22:35.738522shield sshd\[20725\]: Failed password for root from 222.186.175.182 port 60912 ssh2
2019-12-02 14:22:59

Recently Reported IPs

25.162.147.231 184.144.75.201 172.198.69.172 196.96.236.230
158.132.135.156 254.110.113.150 163.100.246.22 4.1.102.92
170.30.8.131 110.36.151.5 108.199.211.13 8.162.188.18
20.81.126.138 7.178.94.170 87.59.47.238 93.34.181.62
138.217.20.179 72.150.105.131 2.37.172.167 210.112.131.186