Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.29.5.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39061
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.29.5.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121901 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 05:43:41 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'Host 138.5.29.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.29.5.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.238 attackspam
$f2bV_matches
2020-04-29 04:55:44
213.65.118.163 attack
Unauthorized connection attempt detected from IP address 213.65.118.163 to port 5555
2020-04-29 04:36:37
192.210.163.104 attack
Unauthorized connection attempt detected from IP address 192.210.163.104 to port 22
2020-04-29 04:39:46
1.47.39.116 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-29 04:19:10
83.48.29.116 attackbotsspam
Apr 28 16:39:15 NPSTNNYC01T sshd[18973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.48.29.116
Apr 28 16:39:17 NPSTNNYC01T sshd[18973]: Failed password for invalid user nathalia from 83.48.29.116 port 34521 ssh2
Apr 28 16:48:15 NPSTNNYC01T sshd[19715]: Failed password for root from 83.48.29.116 port 44842 ssh2
...
2020-04-29 04:51:59
201.49.231.160 attackspam
Unauthorized connection attempt detected from IP address 201.49.231.160 to port 8080
2020-04-29 04:39:04
195.54.160.213 attackspam
firewall-block, port(s): 33392/tcp
2020-04-29 04:17:55
177.19.228.87 attackbots
2020-04-28T20:06:54.908002abusebot-2.cloudsearch.cf sshd[24346]: Invalid user london from 177.19.228.87 port 51948
2020-04-28T20:06:54.915902abusebot-2.cloudsearch.cf sshd[24346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.228.87
2020-04-28T20:06:54.908002abusebot-2.cloudsearch.cf sshd[24346]: Invalid user london from 177.19.228.87 port 51948
2020-04-28T20:06:56.799818abusebot-2.cloudsearch.cf sshd[24346]: Failed password for invalid user london from 177.19.228.87 port 51948 ssh2
2020-04-28T20:11:31.553764abusebot-2.cloudsearch.cf sshd[24361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.228.87  user=root
2020-04-28T20:11:33.467443abusebot-2.cloudsearch.cf sshd[24361]: Failed password for root from 177.19.228.87 port 59338 ssh2
2020-04-28T20:12:56.001200abusebot-2.cloudsearch.cf sshd[24363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.
...
2020-04-29 04:23:11
177.19.34.129 attackspambots
1588075587 - 04/28/2020 14:06:27 Host: 177.19.34.129/177.19.34.129 Port: 445 TCP Blocked
2020-04-29 04:32:06
62.33.168.46 attackspam
Apr 28 15:34:25 eventyay sshd[17420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.33.168.46
Apr 28 15:34:27 eventyay sshd[17420]: Failed password for invalid user victor from 62.33.168.46 port 1118 ssh2
Apr 28 15:41:55 eventyay sshd[17788]: Failed password for root from 62.33.168.46 port 43174 ssh2
...
2020-04-29 04:22:17
27.147.219.174 attack
Automatic report - Windows Brute-Force Attack
2020-04-29 04:20:07
168.205.57.26 attackspambots
Unauthorized connection attempt detected from IP address 168.205.57.26 to port 23
2020-04-29 04:46:49
175.202.101.227 attack
Unauthorized connection attempt detected from IP address 175.202.101.227 to port 23
2020-04-29 04:46:11
45.55.155.72 attackspam
Apr 28 16:29:03 vmd26974 sshd[30527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.72
Apr 28 16:29:05 vmd26974 sshd[30527]: Failed password for invalid user flex from 45.55.155.72 port 32805 ssh2
...
2020-04-29 04:21:26
115.135.82.250 attackspambots
Tried sshing with brute force.
2020-04-29 04:32:24

Recently Reported IPs

109.118.99.238 89.77.13.118 66.37.116.103 114.64.11.222
122.126.17.181 208.176.132.226 236.248.182.220 119.212.227.57
167.217.88.93 202.232.91.71 174.100.166.22 130.250.218.199
8.159.229.80 161.230.40.205 246.115.100.24 168.240.105.242
83.117.119.128 137.191.8.242 141.133.211.110 248.202.75.75