Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.164.139.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33567
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.164.139.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:49:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 218.139.164.55.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
server can't find 55.164.139.218.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
180.101.125.226 attack
Sep 16 17:59:02 taivassalofi sshd[91834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.226
Sep 16 17:59:03 taivassalofi sshd[91834]: Failed password for invalid user shu from 180.101.125.226 port 60648 ssh2
...
2019-09-16 23:28:52
116.196.116.9 attackspambots
Sep 16 00:27:59 kapalua sshd\[28816\]: Invalid user test from 116.196.116.9
Sep 16 00:27:59 kapalua sshd\[28816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.116.9
Sep 16 00:28:00 kapalua sshd\[28816\]: Failed password for invalid user test from 116.196.116.9 port 52699 ssh2
Sep 16 00:31:45 kapalua sshd\[29147\]: Invalid user emilio from 116.196.116.9
Sep 16 00:31:45 kapalua sshd\[29147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.116.9
2019-09-16 23:26:55
180.167.233.251 attack
ssh failed login
2019-09-16 23:19:45
60.6.130.186 attackspam
" "
2019-09-17 00:09:57
52.168.104.122 attackspambots
Sep 16 09:25:06 MK-Soft-VM3 sshd\[3744\]: Invalid user sh from 52.168.104.122 port 37774
Sep 16 09:25:06 MK-Soft-VM3 sshd\[3744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.168.104.122
Sep 16 09:25:08 MK-Soft-VM3 sshd\[3744\]: Failed password for invalid user sh from 52.168.104.122 port 37774 ssh2
...
2019-09-16 23:55:43
112.112.102.79 attackbotsspam
Sep 16 03:13:20 php1 sshd\[18941\]: Invalid user iskren from 112.112.102.79
Sep 16 03:13:20 php1 sshd\[18941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.112.102.79
Sep 16 03:13:22 php1 sshd\[18941\]: Failed password for invalid user iskren from 112.112.102.79 port 3093 ssh2
Sep 16 03:19:01 php1 sshd\[19404\]: Invalid user bayonne from 112.112.102.79
Sep 16 03:19:01 php1 sshd\[19404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.112.102.79
2019-09-17 00:16:32
166.62.32.32 attackbotsspam
166.62.32.32 - - [16/Sep/2019:13:31:10 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.32.32 - - [16/Sep/2019:13:31:11 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.32.32 - - [16/Sep/2019:13:31:11 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.32.32 - - [16/Sep/2019:13:31:18 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.32.32 - - [16/Sep/2019:13:31:18 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.32.32 - - [16/Sep/2019:13:31:19 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-09-17 00:35:03
168.90.89.35 attackspambots
Sep 16 18:52:57 server sshd\[29456\]: Invalid user dumbo from 168.90.89.35 port 53738
Sep 16 18:52:57 server sshd\[29456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35
Sep 16 18:52:59 server sshd\[29456\]: Failed password for invalid user dumbo from 168.90.89.35 port 53738 ssh2
Sep 16 19:00:36 server sshd\[15722\]: Invalid user nagios from 168.90.89.35 port 47326
Sep 16 19:00:36 server sshd\[15722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35
2019-09-17 00:28:05
110.139.88.213 attackspambots
Automatic report - Port Scan Attack
2019-09-16 23:39:48
119.47.69.107 attackbotsspam
DATE:2019-09-16 10:21:46, IP:119.47.69.107, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-09-17 00:04:46
104.248.65.180 attackspam
Sep 16 04:45:59 tdfoods sshd\[9616\]: Invalid user po from 104.248.65.180
Sep 16 04:45:59 tdfoods sshd\[9616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180
Sep 16 04:46:02 tdfoods sshd\[9616\]: Failed password for invalid user po from 104.248.65.180 port 50648 ssh2
Sep 16 04:50:24 tdfoods sshd\[10039\]: Invalid user steam from 104.248.65.180
Sep 16 04:50:24 tdfoods sshd\[10039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180
2019-09-17 00:08:39
144.217.161.22 attack
schuetzenmusikanten.de 144.217.161.22 \[15/Sep/2019:02:04:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 5682 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 144.217.161.22 \[15/Sep/2019:02:04:46 +0200\] "POST /wp-login.php HTTP/1.1" 200 5648 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-17 00:06:42
209.97.169.136 attackbots
Sep 16 08:21:03 unicornsoft sshd\[21911\]: Invalid user nancy from 209.97.169.136
Sep 16 08:21:03 unicornsoft sshd\[21911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.169.136
Sep 16 08:21:06 unicornsoft sshd\[21911\]: Failed password for invalid user nancy from 209.97.169.136 port 60796 ssh2
2019-09-17 00:37:59
104.236.2.45 attackspam
Sep 16 11:40:58 vps200512 sshd\[7416\]: Invalid user informix from 104.236.2.45
Sep 16 11:40:58 vps200512 sshd\[7416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.2.45
Sep 16 11:41:00 vps200512 sshd\[7416\]: Failed password for invalid user informix from 104.236.2.45 port 38390 ssh2
Sep 16 11:44:53 vps200512 sshd\[7459\]: Invalid user test from 104.236.2.45
Sep 16 11:44:53 vps200512 sshd\[7459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.2.45
2019-09-16 23:54:45
123.149.73.126 attackbots
Port 1433 Scan
2019-09-17 00:31:22

Recently Reported IPs

239.224.42.226 68.248.224.213 178.136.102.193 235.66.10.88
27.168.76.25 51.236.108.235 44.97.171.134 70.110.233.87
119.35.75.124 22.41.30.149 152.184.218.141 60.88.240.43
22.77.199.179 190.17.183.65 61.17.243.93 113.48.20.255
56.80.33.46 100.222.28.184 13.244.224.207 67.166.4.191