Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.243.1.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61874
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.243.1.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 18:18:10 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 192.1.243.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.243.1.192.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
47.52.239.42 attack
47.52.239.42 - - \[02/Aug/2020:22:42:56 +0200\] "POST /wp-login.php HTTP/1.0" 200 5615 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
47.52.239.42 - - \[02/Aug/2020:22:42:59 +0200\] "POST /wp-login.php HTTP/1.0" 200 5435 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
47.52.239.42 - - \[02/Aug/2020:22:43:02 +0200\] "POST /wp-login.php HTTP/1.0" 200 5428 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-03 08:05:21
5.16.120.111 attack
20/8/2@16:21:29: FAIL: Alarm-Network address from=5.16.120.111
...
2020-08-03 08:12:16
218.92.0.246 attackspambots
SSH brutforce
2020-08-03 07:44:22
218.92.0.247 attackbots
2020-08-03T03:06:38.304950lavrinenko.info sshd[13467]: Failed password for root from 218.92.0.247 port 46811 ssh2
2020-08-03T03:06:43.611861lavrinenko.info sshd[13467]: Failed password for root from 218.92.0.247 port 46811 ssh2
2020-08-03T03:06:48.920323lavrinenko.info sshd[13467]: Failed password for root from 218.92.0.247 port 46811 ssh2
2020-08-03T03:06:53.565336lavrinenko.info sshd[13467]: Failed password for root from 218.92.0.247 port 46811 ssh2
2020-08-03T03:06:53.883371lavrinenko.info sshd[13467]: error: maximum authentication attempts exceeded for root from 218.92.0.247 port 46811 ssh2 [preauth]
...
2020-08-03 08:09:06
201.122.102.21 attackspam
Bruteforce detected by fail2ban
2020-08-03 08:07:46
111.231.132.94 attackspam
Aug  3 00:08:59 [host] sshd[25102]: Invalid user Q
Aug  3 00:08:59 [host] sshd[25102]: pam_unix(sshd:
Aug  3 00:09:01 [host] sshd[25102]: Failed passwor
2020-08-03 07:56:10
150.109.104.175 attackspambots
Ssh brute force
2020-08-03 08:17:07
145.239.85.21 attack
Aug  2 18:39:57 r.ca sshd[32093]: Failed password for root from 145.239.85.21 port 51467 ssh2
2020-08-03 07:42:57
121.186.122.216 attackbotsspam
frenzy
2020-08-03 07:41:26
37.49.230.113 attackspam
Icarus honeypot on github
2020-08-03 08:17:25
223.71.167.163 attackspambots
[MK-VM2] Blocked by UFW
2020-08-03 07:43:36
51.91.123.119 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-02T20:34:56Z and 2020-08-02T20:45:03Z
2020-08-03 07:58:59
165.22.114.208 attackspambots
165.22.114.208 - - [02/Aug/2020:22:25:52 +0200] "POST /wp-login.php HTTP/1.1" 200 5402 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.114.208 - - [02/Aug/2020:22:45:20 +0200] "POST /wp-login.php HTTP/1.1" 200 5180 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.114.208 - - [02/Aug/2020:22:45:21 +0200] "POST /wp-login.php HTTP/1.1" 200 5164 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.114.208 - - [02/Aug/2020:22:45:22 +0200] "POST /wp-login.php HTTP/1.1" 200 5161 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.114.208 - - [02/Aug/2020:22:45:25 +0200] "POST /wp-login.php HTTP/1.1" 200 5158 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-03 08:03:49
60.167.178.170 attackspambots
reported through recidive - multiple failed attempts(SSH)
2020-08-03 08:14:37
3.85.23.148 attackspambots
Port Scan detected!
...
2020-08-03 08:03:09

Recently Reported IPs

38.78.129.219 230.98.10.157 92.133.241.126 243.16.104.155
13.47.201.47 92.22.90.175 189.119.171.48 195.136.63.59
12.39.19.118 37.196.14.108 228.81.216.144 164.193.51.123
3.42.83.18 103.93.211.212 75.76.135.125 165.137.163.190
77.248.180.246 146.64.216.216 86.195.224.154 234.68.7.224