Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.155.148.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50792
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.155.148.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030900 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 14:11:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 196.148.155.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.155.148.196.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
118.24.3.40 attack
Automatic report generated by Wazuh
2019-10-06 01:35:41
91.134.141.89 attackbots
Invalid user newbreak from 91.134.141.89 port 38654
2019-10-06 01:34:33
189.14.233.202 attack
Connection by 189.14.233.202 on port: 5000 got caught by honeypot at 10/5/2019 4:31:53 AM
2019-10-06 02:01:09
203.177.70.171 attack
2019-10-05T17:22:01.507607abusebot-8.cloudsearch.cf sshd\[3041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.177.70.171  user=root
2019-10-06 01:32:42
51.75.52.241 attackbotsspam
Oct  5 19:05:51 SilenceServices sshd[29038]: Failed password for root from 51.75.52.241 port 55884 ssh2
Oct  5 19:10:01 SilenceServices sshd[30213]: Failed password for root from 51.75.52.241 port 42188 ssh2
2019-10-06 01:36:09
35.227.18.236 attackbotsspam
Automated report (2019-10-05T11:32:18+00:00). Misbehaving bot detected at this address.
2019-10-06 01:39:55
175.151.218.24 attack
Unauthorised access (Oct  5) SRC=175.151.218.24 LEN=40 TTL=49 ID=40402 TCP DPT=8080 WINDOW=19257 SYN 
Unauthorised access (Oct  5) SRC=175.151.218.24 LEN=40 TTL=49 ID=37527 TCP DPT=8080 WINDOW=19257 SYN 
Unauthorised access (Oct  4) SRC=175.151.218.24 LEN=40 TTL=49 ID=17239 TCP DPT=8080 WINDOW=5233 SYN 
Unauthorised access (Oct  4) SRC=175.151.218.24 LEN=40 TTL=49 ID=8242 TCP DPT=8080 WINDOW=19257 SYN 
Unauthorised access (Oct  4) SRC=175.151.218.24 LEN=40 TTL=49 ID=39774 TCP DPT=8080 WINDOW=5233 SYN 
Unauthorised access (Oct  4) SRC=175.151.218.24 LEN=40 TTL=49 ID=36682 TCP DPT=8080 WINDOW=51625 SYN 
Unauthorised access (Oct  3) SRC=175.151.218.24 LEN=40 TTL=49 ID=43038 TCP DPT=8080 WINDOW=51625 SYN
2019-10-06 02:04:47
123.19.228.76 attackspambots
Unauthorized connection attempt from IP address 123.19.228.76 on Port 445(SMB)
2019-10-06 02:05:29
37.130.156.39 attackbots
Oct  5 16:21:18 core sshd[26734]: Invalid user admin from 37.130.156.39 port 37486
Oct  5 16:21:21 core sshd[26734]: Failed password for invalid user admin from 37.130.156.39 port 37486 ssh2
...
2019-10-06 01:49:09
103.199.145.82 attackspam
Oct  5 15:11:44 vps647732 sshd[13954]: Failed password for root from 103.199.145.82 port 39730 ssh2
...
2019-10-06 01:55:32
36.68.55.193 attackspambots
Unauthorized connection attempt from IP address 36.68.55.193 on Port 445(SMB)
2019-10-06 02:05:06
196.221.149.76 attackbotsspam
Unauthorized connection attempt from IP address 196.221.149.76 on Port 445(SMB)
2019-10-06 01:59:42
190.144.14.170 attackspambots
Oct  5 12:55:15 mail sshd[28926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.14.170  user=root
Oct  5 12:55:17 mail sshd[28926]: Failed password for root from 190.144.14.170 port 32800 ssh2
Oct  5 13:15:25 mail sshd[31585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.14.170  user=root
Oct  5 13:15:27 mail sshd[31585]: Failed password for root from 190.144.14.170 port 48284 ssh2
Oct  5 13:31:51 mail sshd[1119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.14.170  user=root
Oct  5 13:31:53 mail sshd[1119]: Failed password for root from 190.144.14.170 port 38636 ssh2
...
2019-10-06 01:57:57
185.143.221.186 attackbotsspam
10/05/2019-13:33:17.121597 185.143.221.186 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-06 01:45:09
116.68.244.125 attackspambots
Unauthorized connection attempt from IP address 116.68.244.125 on Port 445(SMB)
2019-10-06 01:47:28

Recently Reported IPs

140.242.116.174 2408:825c:3283:3da1:4836:aa31:ffb6:1e2b 215.226.193.138 92.247.197.89
245.213.250.247 21.68.98.24 120.184.192.47 21.44.140.173
165.247.85.177 204.67.78.74 146.196.121.238 178.172.244.176
8.16.94.119 27.198.227.73 164.39.77.191 40.225.185.196
91.240.107.119 18.93.23.169 119.204.37.66 22.175.249.44