Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.234.149.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.234.149.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:27:38 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 1.149.234.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.234.149.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
183.166.171.28 attackbotsspam
Aug 30 06:17:54 srv01 postfix/smtpd\[21099\]: warning: unknown\[183.166.171.28\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 06:21:20 srv01 postfix/smtpd\[28238\]: warning: unknown\[183.166.171.28\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 06:21:32 srv01 postfix/smtpd\[28238\]: warning: unknown\[183.166.171.28\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 06:21:49 srv01 postfix/smtpd\[28238\]: warning: unknown\[183.166.171.28\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 06:22:07 srv01 postfix/smtpd\[28238\]: warning: unknown\[183.166.171.28\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-30 12:32:16
222.186.175.182 attack
Aug 30 06:34:06 melroy-server sshd[10371]: Failed password for root from 222.186.175.182 port 18400 ssh2
Aug 30 06:34:10 melroy-server sshd[10371]: Failed password for root from 222.186.175.182 port 18400 ssh2
...
2020-08-30 12:40:05
159.65.19.39 attack
159.65.19.39 - - [30/Aug/2020:06:03:29 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.19.39 - - [30/Aug/2020:06:03:34 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1857 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.19.39 - - [30/Aug/2020:06:03:40 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-30 13:04:00
161.35.194.252 attack
"Found User-Agent associated with security scanner - Matched Data: zgrab found within REQUEST_HEADERS:User-Agent: mozilla/5.0 zgrab/0.x"
2020-08-30 13:03:18
222.186.30.35 attackspambots
Aug 30 06:32:44 minden010 sshd[25774]: Failed password for root from 222.186.30.35 port 46885 ssh2
Aug 30 06:32:52 minden010 sshd[25815]: Failed password for root from 222.186.30.35 port 22107 ssh2
Aug 30 06:32:55 minden010 sshd[25815]: Failed password for root from 222.186.30.35 port 22107 ssh2
...
2020-08-30 12:35:30
180.214.237.7 attack
Aug 30 03:53:55 *** sshd[15181]: Did not receive identification string from 180.214.237.7
2020-08-30 12:58:07
188.166.32.94 attack
Aug 30 04:28:36 hcbbdb sshd\[30979\]: Invalid user zhang from 188.166.32.94
Aug 30 04:28:36 hcbbdb sshd\[30979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.32.94
Aug 30 04:28:38 hcbbdb sshd\[30979\]: Failed password for invalid user zhang from 188.166.32.94 port 55380 ssh2
Aug 30 04:32:13 hcbbdb sshd\[31315\]: Invalid user ftpuser from 188.166.32.94
Aug 30 04:32:13 hcbbdb sshd\[31315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.32.94
2020-08-30 12:33:37
222.186.175.154 attackbots
Aug 30 04:29:09 scw-6657dc sshd[20997]: Failed password for root from 222.186.175.154 port 23572 ssh2
Aug 30 04:29:09 scw-6657dc sshd[20997]: Failed password for root from 222.186.175.154 port 23572 ssh2
Aug 30 04:29:12 scw-6657dc sshd[20997]: Failed password for root from 222.186.175.154 port 23572 ssh2
...
2020-08-30 12:42:21
122.255.5.42 attackbotsspam
Invalid user mind from 122.255.5.42 port 59684
2020-08-30 13:13:19
193.106.31.146 attackspam
193.106.31.146 - [30/Aug/2020:07:23:05 +0300] "POST /xmlrpc.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.163 Safari/537.36" "-"
193.106.31.146 - [30/Aug/2020:07:31:56 +0300] "POST /xmlrpc.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.163 Safari/537.36" "-"
...
2020-08-30 12:45:31
85.248.227.165 attack
(mod_security) mod_security (id:210492) triggered by 85.248.227.165 (SK/Slovakia/-): 5 in the last 3600 secs
2020-08-30 12:44:42
222.186.30.112 attack
Aug 30 15:07:23 web1 sshd[681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Aug 30 15:07:25 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:28 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:23 web1 sshd[681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Aug 30 15:07:25 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:28 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:23 web1 sshd[681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Aug 30 15:07:25 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 30 15:07:28 web1 sshd[681]: Failed password for root from 222.186.30.112 port 25189 ssh2
Aug 
...
2020-08-30 13:11:13
5.62.62.54 attackbots
(From ernesto.boston@gmail.com) Would you like to promote your website for free? Have a look at this: http://www.post-free-ads.xyz
2020-08-30 12:34:54
196.18.225.177 attackspam
Unauthorized access detected from black listed ip!
2020-08-30 12:52:20
50.3.89.98 attackbotsspam
Unauthorized access detected from black listed ip!
2020-08-30 12:55:00

Recently Reported IPs

53.235.137.84 218.207.103.245 186.90.55.182 91.189.13.111
234.82.56.163 90.39.70.213 229.120.235.156 98.176.153.108
15.120.178.188 249.28.97.66 90.82.225.15 69.44.23.191
103.50.120.218 4.149.28.77 54.106.208.129 141.140.51.164
219.224.145.52 119.250.157.106 216.164.244.162 229.9.24.134