Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.245.5.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.245.5.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:53:32 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 194.5.245.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.245.5.194.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.162.235.113 attackbots
2019-11-06T15:27:02.193320mail01 postfix/smtpd[530]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06T15:32:21.381492mail01 postfix/smtpd[31976]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06T15:32:21.381894mail01 postfix/smtpd[31183]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06 22:34:03
116.211.96.93 attack
firewall-block, port(s): 1433/tcp
2019-11-06 22:14:53
118.25.143.199 attackbotsspam
Nov  6 13:41:17 DAAP sshd[5647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.143.199  user=root
Nov  6 13:41:19 DAAP sshd[5647]: Failed password for root from 118.25.143.199 port 53244 ssh2
Nov  6 13:46:31 DAAP sshd[5693]: Invalid user ashley from 118.25.143.199 port 43774
...
2019-11-06 22:16:37
115.78.15.98 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 06-11-2019 06:20:22.
2019-11-06 22:06:22
52.187.121.7 attackspam
Wordpress XMLRPC attack
2019-11-06 22:21:51
46.101.224.184 attackspambots
Nov  6 13:32:19 dedicated sshd[3078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184  user=root
Nov  6 13:32:21 dedicated sshd[3078]: Failed password for root from 46.101.224.184 port 36846 ssh2
2019-11-06 21:56:03
185.62.136.55 attack
Wordpress bruteforce
2019-11-06 22:14:35
13.211.64.118 attackbots
Nov  6 09:16:13 server sshd\[32386\]: User root from 13.211.64.118 not allowed because listed in DenyUsers
Nov  6 09:16:13 server sshd\[32386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.211.64.118  user=root
Nov  6 09:16:15 server sshd\[32386\]: Failed password for invalid user root from 13.211.64.118 port 38615 ssh2
Nov  6 09:21:20 server sshd\[26706\]: Invalid user cs from 13.211.64.118 port 58261
Nov  6 09:21:20 server sshd\[26706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.211.64.118
2019-11-06 22:35:20
198.12.64.90 attackbots
SIPVicious Scanner Detection, PTR: 198-12-64-90-host.colocrossing.com.
2019-11-06 22:00:11
78.128.113.120 attack
2019-11-06T14:42:09.457989mail01 postfix/smtpd[27753]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed:
2019-11-06T14:42:16.286110mail01 postfix/smtpd[30122]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed:
2019-11-06T14:42:45.295395mail01 postfix/smtpd[28707]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed:
2019-11-06 21:57:39
202.65.170.174 attackspam
Sending SPAM email
2019-11-06 22:18:41
27.254.194.99 attackbotsspam
Nov  6 15:18:27 DAAP sshd[6726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99  user=root
Nov  6 15:18:29 DAAP sshd[6726]: Failed password for root from 27.254.194.99 port 46172 ssh2
Nov  6 15:23:09 DAAP sshd[6767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99  user=root
Nov  6 15:23:11 DAAP sshd[6767]: Failed password for root from 27.254.194.99 port 56602 ssh2
...
2019-11-06 22:29:51
67.205.154.87 attack
SIPVicious Scanner Detection, PTR: PTR record not found
2019-11-06 22:09:44
101.27.175.144 attackbots
Unauthorised access (Nov  6) SRC=101.27.175.144 LEN=40 TTL=49 ID=47820 TCP DPT=8080 WINDOW=17265 SYN 
Unauthorised access (Nov  5) SRC=101.27.175.144 LEN=40 TTL=49 ID=52266 TCP DPT=8080 WINDOW=17265 SYN
2019-11-06 22:15:28
115.94.207.204 attack
3 failed emails per dmarc_support@corp.mail.ru [Tue Nov 05 00:00:00 2019 GMT thru Wed Nov 06 00:00:00 2019 GMT]
2019-11-06 22:35:40

Recently Reported IPs

62.124.101.218 246.46.179.202 132.233.228.163 25.196.174.208
255.212.213.133 27.35.68.9 6.214.194.138 197.77.235.123
148.223.228.253 73.125.155.104 181.8.23.67 57.11.97.130
161.177.170.254 255.180.163.42 178.7.163.133 58.195.131.170
81.212.215.74 81.119.139.149 199.11.229.62 255.167.19.95