Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.156.48.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.156.48.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 22:27:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 148.48.156.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.156.48.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
165.227.45.249 attack
Brute-force attempt banned
2020-07-08 19:52:19
51.255.173.222 attackbotsspam
Jul  8 13:48:53 rancher-0 sshd[192119]: Invalid user wisonadmin from 51.255.173.222 port 57182
Jul  8 13:48:56 rancher-0 sshd[192119]: Failed password for invalid user wisonadmin from 51.255.173.222 port 57182 ssh2
...
2020-07-08 19:49:53
218.92.0.216 attackspam
Jul  8 13:43:41 host sshd[9162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.216  user=root
Jul  8 13:43:44 host sshd[9162]: Failed password for root from 218.92.0.216 port 50655 ssh2
...
2020-07-08 19:45:06
221.2.35.78 attack
Jul  8 13:44:58 piServer sshd[25399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.2.35.78 
Jul  8 13:45:00 piServer sshd[25399]: Failed password for invalid user sam from 221.2.35.78 port 62927 ssh2
Jul  8 13:48:55 piServer sshd[25863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.2.35.78 
...
2020-07-08 19:50:45
132.248.254.246 attackspambots
Jul  8 13:40:57 rotator sshd\[18474\]: Invalid user calixto from 132.248.254.246Jul  8 13:40:59 rotator sshd\[18474\]: Failed password for invalid user calixto from 132.248.254.246 port 2267 ssh2Jul  8 13:45:38 rotator sshd\[19266\]: Invalid user Worxcode from 132.248.254.246Jul  8 13:45:40 rotator sshd\[19266\]: Failed password for invalid user Worxcode from 132.248.254.246 port 2270 ssh2Jul  8 13:48:51 rotator sshd\[19301\]: Invalid user odoo8 from 132.248.254.246Jul  8 13:48:53 rotator sshd\[19301\]: Failed password for invalid user odoo8 from 132.248.254.246 port 2272 ssh2
...
2020-07-08 19:52:31
180.76.100.17 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-07-08 19:57:33
159.89.88.119 attack
2020-07-08T07:25:37.3967091495-001 sshd[11877]: Invalid user luoyy from 159.89.88.119 port 41886
2020-07-08T07:25:39.4426831495-001 sshd[11877]: Failed password for invalid user luoyy from 159.89.88.119 port 41886 ssh2
2020-07-08T07:28:52.7568701495-001 sshd[11978]: Invalid user www from 159.89.88.119 port 39418
2020-07-08T07:28:52.7601691495-001 sshd[11978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.88.119
2020-07-08T07:28:52.7568701495-001 sshd[11978]: Invalid user www from 159.89.88.119 port 39418
2020-07-08T07:28:55.2406891495-001 sshd[11978]: Failed password for invalid user www from 159.89.88.119 port 39418 ssh2
...
2020-07-08 20:02:12
201.148.247.109 attack
(smtpauth) Failed SMTP AUTH login from 201.148.247.109 (BR/Brazil/ip-201-148-247-109.sulig.net.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-08 08:09:31 plain authenticator failed for ([201.148.247.109]) [201.148.247.109]: 535 Incorrect authentication data (set_id=info@mobarakehpipe.com)
2020-07-08 19:45:55
218.92.0.199 attackbots
2020-07-08T13:42:11.971207rem.lavrinenko.info sshd[17822]: refused connect from 218.92.0.199 (218.92.0.199)
2020-07-08T13:43:47.731608rem.lavrinenko.info sshd[17825]: refused connect from 218.92.0.199 (218.92.0.199)
2020-07-08T13:45:31.659770rem.lavrinenko.info sshd[17826]: refused connect from 218.92.0.199 (218.92.0.199)
2020-07-08T13:47:19.415814rem.lavrinenko.info sshd[17830]: refused connect from 218.92.0.199 (218.92.0.199)
2020-07-08T13:48:55.201986rem.lavrinenko.info sshd[17832]: refused connect from 218.92.0.199 (218.92.0.199)
...
2020-07-08 19:53:38
218.92.0.184 attackbotsspam
Jul  8 13:30:43 santamaria sshd\[26414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Jul  8 13:30:45 santamaria sshd\[26414\]: Failed password for root from 218.92.0.184 port 1969 ssh2
Jul  8 13:31:09 santamaria sshd\[26421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
...
2020-07-08 19:45:21
89.248.162.232 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 23822 proto: TCP cat: Misc Attack
2020-07-08 19:44:43
51.254.38.106 attackbotsspam
Jul  8 06:01:32 server1 sshd\[4666\]: Invalid user rustserver from 51.254.38.106
Jul  8 06:01:32 server1 sshd\[4666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.106 
Jul  8 06:01:35 server1 sshd\[4666\]: Failed password for invalid user rustserver from 51.254.38.106 port 57447 ssh2
Jul  8 06:04:42 server1 sshd\[5664\]: Invalid user fukuyama from 51.254.38.106
Jul  8 06:04:42 server1 sshd\[5664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.106 
...
2020-07-08 20:19:15
141.98.10.208 attackspam
Rude login attack (94 tries in 1d)
2020-07-08 19:56:16
212.70.149.82 attackbots
Jul  8 04:47:03 pixelmemory postfix/smtpd[2260492]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 04:47:32 pixelmemory postfix/smtpd[2260492]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 04:48:00 pixelmemory postfix/smtpd[2263019]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 04:48:27 pixelmemory postfix/smtpd[2260492]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 04:48:56 pixelmemory postfix/smtpd[2263019]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-08 19:51:09
64.227.19.127 attack
21428/tcp 16795/tcp 30552/tcp...
[2020-06-22/07-08]54pkt,19pt.(tcp)
2020-07-08 20:09:12

Recently Reported IPs

212.175.156.87 4.253.99.56 215.177.93.26 171.22.55.211
179.36.96.254 229.180.67.38 178.200.148.54 83.40.163.239
103.199.82.176 32.20.155.99 71.97.136.253 248.39.129.6
195.160.194.174 95.25.84.90 209.250.188.205 115.241.229.228
191.1.96.136 177.32.77.211 93.30.234.211 184.7.181.36