Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.254.180.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.254.180.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:25:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 66.180.254.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.254.180.66.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
179.156.24.125 attack
Telnet/23 MH Probe, BF, Hack -
2019-10-05 17:22:11
45.169.110.199 attack
Oct  5 16:24:28 itv-usvr-01 sshd[25938]: Invalid user pi from 45.169.110.199
Oct  5 16:24:28 itv-usvr-01 sshd[25939]: Invalid user pi from 45.169.110.199
Oct  5 16:24:28 itv-usvr-01 sshd[25938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.169.110.199
Oct  5 16:24:28 itv-usvr-01 sshd[25938]: Invalid user pi from 45.169.110.199
Oct  5 16:24:30 itv-usvr-01 sshd[25938]: Failed password for invalid user pi from 45.169.110.199 port 57916 ssh2
Oct  5 16:24:28 itv-usvr-01 sshd[25939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.169.110.199
Oct  5 16:24:28 itv-usvr-01 sshd[25939]: Invalid user pi from 45.169.110.199
Oct  5 16:24:30 itv-usvr-01 sshd[25939]: Failed password for invalid user pi from 45.169.110.199 port 57918 ssh2
2019-10-05 17:26:13
189.172.79.33 attack
Unauthorized SSH login attempts
2019-10-05 17:21:20
93.125.121.170 attackspambots
Unauthorised access (Oct  5) SRC=93.125.121.170 LEN=40 TTL=246 ID=22319 TCP DPT=445 WINDOW=1024 SYN
2019-10-05 17:00:57
182.73.123.118 attackspam
detected by Fail2Ban
2019-10-05 17:08:09
45.142.195.150 attack
2019-10-05T09:14:45.980262beta postfix/smtpd[30593]: warning: unknown[45.142.195.150]: SASL LOGIN authentication failed: authentication failure
2019-10-05T09:15:26.620792beta postfix/smtpd[30593]: warning: unknown[45.142.195.150]: SASL LOGIN authentication failed: authentication failure
2019-10-05T09:16:09.367715beta postfix/smtpd[30593]: warning: unknown[45.142.195.150]: SASL LOGIN authentication failed: authentication failure
...
2019-10-05 17:28:44
177.68.148.10 attack
Automatic report - Banned IP Access
2019-10-05 16:59:45
222.186.180.19 attack
SSH Bruteforce attempt
2019-10-05 17:04:27
116.203.116.152 attackspambots
Automatic report - XMLRPC Attack
2019-10-05 17:18:22
115.79.78.10 attack
Automatic report - Banned IP Access
2019-10-05 17:13:45
165.22.86.37 attack
[munged]::443 165.22.86.37 - - [05/Oct/2019:05:47:29 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 165.22.86.37 - - [05/Oct/2019:05:47:30 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 165.22.86.37 - - [05/Oct/2019:05:47:30 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 165.22.86.37 - - [05/Oct/2019:05:47:36 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 165.22.86.37 - - [05/Oct/2019:05:47:37 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 165.22.86.37 - - [05/Oct/2019:05:47:38 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Li
2019-10-05 17:22:35
180.106.81.168 attackbotsspam
Oct  5 14:35:03 areeb-Workstation sshd[18573]: Failed password for root from 180.106.81.168 port 47948 ssh2
...
2019-10-05 17:10:34
68.149.146.163 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-10-05 17:33:44
211.34.167.201 attackbots
FTPD brute force attack detected by fail2ban
2019-10-05 17:27:36
121.142.111.106 attack
Oct  5 06:57:11 ncomp sshd[8942]: Invalid user gopi from 121.142.111.106
Oct  5 06:57:11 ncomp sshd[8942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.111.106
Oct  5 06:57:11 ncomp sshd[8942]: Invalid user gopi from 121.142.111.106
Oct  5 06:57:14 ncomp sshd[8942]: Failed password for invalid user gopi from 121.142.111.106 port 38622 ssh2
2019-10-05 17:37:39

Recently Reported IPs

69.200.250.47 91.47.241.129 233.10.232.62 154.82.39.21
135.146.127.96 13.151.73.46 174.136.226.116 42.199.207.117
172.253.201.135 244.58.37.185 39.239.235.143 223.104.214.235
23.88.245.212 246.180.127.80 20.158.8.55 227.56.30.54
201.113.113.65 52.0.2.101 123.187.14.249 157.38.59.247