Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.188.2.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.188.2.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031100 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 11 17:31:24 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 46.2.188.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.188.2.46.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
202.106.93.46 attack
2019-07-23T18:22:35.972338lon01.zurich-datacenter.net sshd\[11350\]: Invalid user vagner from 202.106.93.46 port 59483
2019-07-23T18:22:35.977564lon01.zurich-datacenter.net sshd\[11350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
2019-07-23T18:22:38.253571lon01.zurich-datacenter.net sshd\[11350\]: Failed password for invalid user vagner from 202.106.93.46 port 59483 ssh2
2019-07-23T18:28:54.771365lon01.zurich-datacenter.net sshd\[11463\]: Invalid user ono from 202.106.93.46 port 56722
2019-07-23T18:28:54.776401lon01.zurich-datacenter.net sshd\[11463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
...
2019-07-24 01:48:30
206.180.162.6 attackbotsspam
firewall-block, port(s): 445/tcp
2019-07-24 02:06:18
217.156.250.0 attackbotsspam
ICMP MP Probe, Scan -
2019-07-24 01:58:23
217.156.250.237 attackbotsspam
ICMP MP Probe, Scan -
2019-07-24 01:50:45
112.85.42.72 attack
Jul 23 19:51:09 fr01 sshd[31292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
Jul 23 19:51:11 fr01 sshd[31292]: Failed password for root from 112.85.42.72 port 55157 ssh2
...
2019-07-24 01:54:25
109.110.52.77 attackbots
Jul 23 18:04:43 h2177944 sshd\[21520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.110.52.77  user=root
Jul 23 18:04:45 h2177944 sshd\[21520\]: Failed password for root from 109.110.52.77 port 50548 ssh2
Jul 23 18:39:06 h2177944 sshd\[22482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.110.52.77  user=root
Jul 23 18:39:09 h2177944 sshd\[22482\]: Failed password for root from 109.110.52.77 port 46582 ssh2
...
2019-07-24 01:24:06
195.22.200.251 attackspambots
ICMP MP Probe, Scan -
2019-07-24 02:11:23
203.178.148.19 attackspam
ICMP MP Probe, Scan -
2019-07-24 02:03:57
174.138.40.132 attackbots
SSH Bruteforce Attack
2019-07-24 02:14:57
206.117.25.90 attackspambots
ICMP MP Probe, Scan -
2019-07-24 02:02:30
77.81.109.200 attackspam
2019-07-23T11:05:38.798965mail01 postfix/smtpd[1207]: NOQUEUE: reject: RCPT from unknown[77.81.109.200]: 550
2019-07-24 01:43:05
109.251.68.112 attackbotsspam
2019-07-23T23:44:19.976037enmeeting.mahidol.ac.th sshd\[15110\]: Invalid user ellen from 109.251.68.112 port 46908
2019-07-23T23:44:19.990714enmeeting.mahidol.ac.th sshd\[15110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112
2019-07-23T23:44:21.950928enmeeting.mahidol.ac.th sshd\[15110\]: Failed password for invalid user ellen from 109.251.68.112 port 46908 ssh2
...
2019-07-24 01:20:35
221.149.134.160 attack
Jul 23 10:56:38 mxgate1 postfix/postscreen[17275]: CONNECT from [221.149.134.160]:30574 to [176.31.12.44]:25
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17554]: addr 221.149.134.160 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17553]: addr 221.149.134.160 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17553]: addr 221.149.134.160 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17550]: addr 221.149.134.160 listed by domain bl.spamcop.net as 127.0.0.2
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17551]: addr 221.149.134.160 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17552]: addr 221.149.134.160 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 23 10:56:44 mxgate1 postfix/postscreen[17275]: DNSBL rank 6 for [221.149.134.160]:30574
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.149.134.1
2019-07-24 01:34:57
104.248.157.14 attackspambots
Jul 23 11:06:26 MainVPS sshd[23307]: Invalid user cassandra from 104.248.157.14 port 53144
Jul 23 11:06:26 MainVPS sshd[23307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.157.14
Jul 23 11:06:26 MainVPS sshd[23307]: Invalid user cassandra from 104.248.157.14 port 53144
Jul 23 11:06:28 MainVPS sshd[23307]: Failed password for invalid user cassandra from 104.248.157.14 port 53144 ssh2
Jul 23 11:11:41 MainVPS sshd[23756]: Invalid user exploit from 104.248.157.14 port 49022
...
2019-07-24 01:21:03
117.50.16.214 attack
Jul 23 15:21:40 debian sshd\[533\]: Invalid user app from 117.50.16.214 port 45530
Jul 23 15:21:40 debian sshd\[533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.16.214
...
2019-07-24 01:38:04

Recently Reported IPs

78.46.171.230 241.43.112.170 145.220.43.157 218.194.15.12
248.9.107.46 24.202.89.164 215.132.67.190 25.157.109.188
79.8.207.69 36.212.37.84 120.122.194.82 196.232.179.130
247.180.222.56 35.233.180.203 121.160.229.5 116.88.28.226
59.221.243.84 31.112.20.91 221.102.12.104 240.201.81.234