Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.152.13.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.152.13.243.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:42:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 243.13.152.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.152.13.243.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
94.103.88.151 attack
Brute-force attempt banned
2020-03-12 21:05:37
49.36.142.213 attackbots
Unauthorized connection attempt from IP address 49.36.142.213 on Port 445(SMB)
2020-03-12 20:40:58
125.227.130.2 attackspam
Mar 12 05:28:15 pixelmemory sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.130.2
Mar 12 05:28:17 pixelmemory sshd[5437]: Failed password for invalid user pixelmemory123 from 125.227.130.2 port 1718 ssh2
Mar 12 05:32:11 pixelmemory sshd[6239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.130.2
...
2020-03-12 20:43:22
58.56.9.228 attackspambots
suspicious action Thu, 12 Mar 2020 09:31:51 -0300
2020-03-12 21:13:55
35.188.242.129 attack
Mar 12 13:32:13 ns37 sshd[7920]: Failed password for root from 35.188.242.129 port 43650 ssh2
Mar 12 13:32:13 ns37 sshd[7920]: Failed password for root from 35.188.242.129 port 43650 ssh2
2020-03-12 20:41:41
171.245.199.44 attackspambots
Automatic report - Port Scan Attack
2020-03-12 20:33:26
221.148.63.118 attackbotsspam
suspicious action Thu, 12 Mar 2020 09:32:02 -0300
2020-03-12 20:52:39
192.241.248.244 attackspambots
Unauthorized connection attempt detected from IP address 192.241.248.244 to port 8081
2020-03-12 20:39:56
128.199.170.33 attack
Mar 12 13:25:22 markkoudstaal sshd[18193]: Failed password for root from 128.199.170.33 port 48324 ssh2
Mar 12 13:32:09 markkoudstaal sshd[19227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.33
Mar 12 13:32:11 markkoudstaal sshd[19227]: Failed password for invalid user roy from 128.199.170.33 port 35930 ssh2
2020-03-12 20:42:57
81.214.105.99 attackbots
Unauthorized connection attempt from IP address 81.214.105.99 on Port 445(SMB)
2020-03-12 21:01:32
183.82.0.21 attack
suspicious action Thu, 12 Mar 2020 09:31:58 -0300
2020-03-12 21:01:53
178.250.229.35 attack
Scan detected 2020.03.12 13:32:02 blocked until 2020.04.06 11:03:25
2020-03-12 20:54:36
217.182.95.16 attack
leo_www
2020-03-12 20:48:08
78.224.49.200 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-12 20:47:45
177.130.45.132 attack
trying to access non-authorized port
2020-03-12 21:03:46

Recently Reported IPs

70.148.70.31 30.43.252.198 26.93.154.226 55.147.137.200
210.47.209.114 73.141.185.45 224.163.31.90 97.190.102.7
77.239.125.249 189.182.197.52 114.122.173.35 104.29.91.34
83.101.97.215 54.160.6.24 24.224.247.66 242.4.161.139
24.236.45.189 82.97.202.160 148.69.22.255 107.125.233.117