Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.196.96.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.196.96.114.			IN	A

;; AUTHORITY SECTION:
.			191	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 13 21:56:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 114.96.196.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.196.96.114.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
112.6.116.170 attackbots
SSH Brute Force, server-1 sshd[1120]: Failed password for root from 112.6.116.170 port 58192 ssh2
2019-09-03 13:14:16
185.175.93.18 attackspambots
09/03/2019-00:18:52.604866 185.175.93.18 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-03 13:01:52
210.209.72.243 attackspambots
Sep  3 06:24:37 lnxweb61 sshd[29670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.72.243
2019-09-03 12:30:39
122.166.169.26 attackbots
Sep  3 07:47:36 www2 sshd\[53499\]: Invalid user takashi from 122.166.169.26Sep  3 07:47:37 www2 sshd\[53499\]: Failed password for invalid user takashi from 122.166.169.26 port 56922 ssh2Sep  3 07:53:41 www2 sshd\[54090\]: Invalid user aaa from 122.166.169.26
...
2019-09-03 12:57:06
134.175.197.226 attackbots
Sep  3 06:47:54 MK-Soft-Root1 sshd\[9498\]: Invalid user tads from 134.175.197.226 port 43625
Sep  3 06:47:54 MK-Soft-Root1 sshd\[9498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.197.226
Sep  3 06:47:56 MK-Soft-Root1 sshd\[9498\]: Failed password for invalid user tads from 134.175.197.226 port 43625 ssh2
...
2019-09-03 13:03:31
218.29.118.26 attack
SSH Brute Force, server-1 sshd[2645]: Failed password for invalid user musikbot from 218.29.118.26 port 32906 ssh2
2019-09-03 13:17:18
14.63.223.226 attackspambots
Sep  3 06:05:49 markkoudstaal sshd[8598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.223.226
Sep  3 06:05:51 markkoudstaal sshd[8598]: Failed password for invalid user teamspeak5 from 14.63.223.226 port 38886 ssh2
Sep  3 06:10:22 markkoudstaal sshd[9130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.223.226
2019-09-03 12:27:57
213.120.170.34 attackbots
Sep  3 05:22:31 meumeu sshd[21261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.120.170.34 
Sep  3 05:22:33 meumeu sshd[21261]: Failed password for invalid user cvsuser from 213.120.170.34 port 40355 ssh2
Sep  3 05:30:08 meumeu sshd[22444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.120.170.34 
...
2019-09-03 12:53:11
219.153.31.186 attackspambots
Sep  3 03:42:08 markkoudstaal sshd[27374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.31.186
Sep  3 03:42:10 markkoudstaal sshd[27374]: Failed password for invalid user silvio from 219.153.31.186 port 16668 ssh2
Sep  3 03:46:34 markkoudstaal sshd[27780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.31.186
2019-09-03 12:33:22
144.217.83.201 attackbotsspam
Sep  3 03:41:04 SilenceServices sshd[5949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.83.201
Sep  3 03:41:06 SilenceServices sshd[5949]: Failed password for invalid user ftpuser1 from 144.217.83.201 port 59758 ssh2
Sep  3 03:44:55 SilenceServices sshd[8842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.83.201
2019-09-03 13:05:44
123.207.79.126 attack
Sep  3 03:22:18 yabzik sshd[7189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.79.126
Sep  3 03:22:21 yabzik sshd[7189]: Failed password for invalid user postgres1 from 123.207.79.126 port 37780 ssh2
Sep  3 03:25:48 yabzik sshd[8377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.79.126
2019-09-03 12:40:20
49.88.112.115 attackspam
Sep  3 05:42:51 dev0-dcde-rnet sshd[4865]: Failed password for root from 49.88.112.115 port 19130 ssh2
Sep  3 05:46:06 dev0-dcde-rnet sshd[4900]: Failed password for root from 49.88.112.115 port 26723 ssh2
2019-09-03 13:07:58
187.188.73.122 attack
Unauthorized connection attempt from IP address 187.188.73.122 on Port 445(SMB)
2019-09-03 12:32:29
181.193.68.74 attackbotsspam
Unauthorised access (Sep  3) SRC=181.193.68.74 LEN=40 TTL=240 ID=16459 TCP DPT=445 WINDOW=1024 SYN
2019-09-03 12:34:10
118.99.213.33 attackspam
Automatic report - Port Scan Attack
2019-09-03 12:49:12

Recently Reported IPs

157.205.170.170 178.132.3.156 77.142.194.72 228.96.99.240
250.215.19.58 188.36.103.169 25.189.19.185 33.178.85.191
157.6.138.103 178.161.227.188 19.253.35.131 200.140.90.87
40.246.23.189 252.93.255.18 175.86.152.228 52.203.21.253
95.135.221.65 89.166.34.227 194.200.20.25 188.92.80.77