Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.29.132.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.29.132.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 12:12:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 150.132.29.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.29.132.150.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
54.38.241.162 attackbotsspam
Invalid user mktg3 from 54.38.241.162 port 43206
2019-08-23 22:58:32
178.128.201.224 attackspam
"Fail2Ban detected SSH brute force attempt"
2019-08-23 23:40:46
50.239.140.1 attackbotsspam
Aug 23 16:42:42 eventyay sshd[23555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1
Aug 23 16:42:44 eventyay sshd[23555]: Failed password for invalid user hammer from 50.239.140.1 port 54172 ssh2
Aug 23 16:46:59 eventyay sshd[24572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1
...
2019-08-23 23:00:30
206.189.165.34 attackspambots
Aug 23 14:01:55 *** sshd[22853]: User root from 206.189.165.34 not allowed because not listed in AllowUsers
2019-08-23 23:23:42
14.188.100.82 attack
Invalid user admin from 14.188.100.82 port 46322
2019-08-23 23:13:56
178.127.109.118 attackbots
Invalid user admin from 178.127.109.118 port 44030
2019-08-23 23:41:10
195.214.223.84 attack
Invalid user www1 from 195.214.223.84 port 46914
2019-08-23 23:31:43
139.155.140.235 attack
Invalid user dell from 139.155.140.235 port 41452
2019-08-23 23:52:03
150.223.21.177 attackspam
Automated report - ssh fail2ban:
Aug 23 16:34:55 authentication failure 
Aug 23 16:34:57 wrong password, user=shashi, port=40003, ssh2
Aug 23 16:41:07 authentication failure
2019-08-23 23:50:13
68.183.147.197 attack
Aug 23 16:24:05 lnxded64 sshd[13655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.147.197
2019-08-23 22:52:58
211.253.10.96 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2019-08-23 23:22:17
43.243.128.213 attackspam
$f2bV_matches
2019-08-23 23:05:47
77.247.181.162 attackbotsspam
Chat Spam
2019-08-23 22:51:43
92.222.72.234 attackspambots
Invalid user user1 from 92.222.72.234 port 35148
2019-08-23 22:47:19
45.12.220.250 attackbotsspam
Invalid user toor from 45.12.220.250 port 48863
2019-08-23 23:04:37

Recently Reported IPs

126.60.157.28 32.198.210.205 63.128.46.27 32.241.246.65
220.175.197.239 180.4.173.94 205.85.29.86 127.230.91.173
125.36.223.72 233.49.86.150 237.242.15.36 218.23.131.221
90.46.193.71 253.210.85.228 4.63.56.7 224.46.153.230
68.214.230.152 240.109.254.89 180.247.54.191 19.236.197.209