Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.4.102.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;55.4.102.145.			IN	A

;; AUTHORITY SECTION:
.			514	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 20 08:02:49 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 145.102.4.55.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 145.102.4.55.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
119.10.114.5 attackspam
Sep 27 02:37:10 hcbb sshd\[5007\]: Invalid user manager1 from 119.10.114.5
Sep 27 02:37:10 hcbb sshd\[5007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.114.5
Sep 27 02:37:12 hcbb sshd\[5007\]: Failed password for invalid user manager1 from 119.10.114.5 port 55124 ssh2
Sep 27 02:39:14 hcbb sshd\[5240\]: Invalid user bsmith from 119.10.114.5
Sep 27 02:39:14 hcbb sshd\[5240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.114.5
2019-09-27 21:25:09
112.166.68.193 attackspam
Reported by AbuseIPDB proxy server.
2019-09-27 20:59:50
222.186.42.15 attack
$f2bV_matches
2019-09-27 20:46:34
192.99.10.122 attack
Attempted to connect 3 times to port 8545 TCP
2019-09-27 21:13:50
200.160.111.44 attack
Sep 27 14:15:37 MK-Soft-Root2 sshd[32520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.111.44 
Sep 27 14:15:39 MK-Soft-Root2 sshd[32520]: Failed password for invalid user connor from 200.160.111.44 port 51869 ssh2
...
2019-09-27 20:41:50
153.36.236.35 attack
Sep 27 14:44:19 mail sshd\[26177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
Sep 27 14:44:22 mail sshd\[26177\]: Failed password for root from 153.36.236.35 port 20836 ssh2
Sep 27 14:44:24 mail sshd\[26177\]: Failed password for root from 153.36.236.35 port 20836 ssh2
Sep 27 14:44:27 mail sshd\[26177\]: Failed password for root from 153.36.236.35 port 20836 ssh2
Sep 27 14:46:38 mail sshd\[26546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
2019-09-27 20:51:36
80.82.70.225 attackbotsspam
RDP Bruteforce
2019-09-27 21:06:38
114.238.114.68 attackbotsspam
Automated reporting of FTP Brute Force
2019-09-27 20:59:31
140.143.200.251 attackspambots
Sep 27 14:44:43 OPSO sshd\[25102\]: Invalid user ka from 140.143.200.251 port 50716
Sep 27 14:44:43 OPSO sshd\[25102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251
Sep 27 14:44:45 OPSO sshd\[25102\]: Failed password for invalid user ka from 140.143.200.251 port 50716 ssh2
Sep 27 14:49:00 OPSO sshd\[25876\]: Invalid user cloud_user from 140.143.200.251 port 51102
Sep 27 14:49:00 OPSO sshd\[25876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251
2019-09-27 20:49:35
175.100.138.165 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:15:20.
2019-09-27 20:57:44
222.186.42.241 attack
Sep 27 14:35:43 root sshd[1949]: Failed password for root from 222.186.42.241 port 61124 ssh2
Sep 27 14:35:46 root sshd[1949]: Failed password for root from 222.186.42.241 port 61124 ssh2
Sep 27 14:35:48 root sshd[1949]: Failed password for root from 222.186.42.241 port 61124 ssh2
...
2019-09-27 20:53:34
62.234.152.218 attackspambots
Sep 27 03:01:27 php1 sshd\[14501\]: Invalid user passwd from 62.234.152.218
Sep 27 03:01:27 php1 sshd\[14501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218
Sep 27 03:01:29 php1 sshd\[14501\]: Failed password for invalid user passwd from 62.234.152.218 port 53617 ssh2
Sep 27 03:07:44 php1 sshd\[15175\]: Invalid user rp from 62.234.152.218
Sep 27 03:07:44 php1 sshd\[15175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218
2019-09-27 21:08:55
179.238.216.48 attackspam
ssh bruteforce or scan
...
2019-09-27 20:46:59
125.37.161.82 attack
Automated reporting of FTP Brute Force
2019-09-27 21:25:35
123.21.206.185 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:15:19.
2019-09-27 20:59:16

Recently Reported IPs

219.253.64.213 146.30.134.173 23.55.27.228 159.20.41.31
92.184.216.174 187.106.78.83 117.4.243.144 145.151.170.187
38.119.176.153 241.174.26.40 81.117.171.147 150.162.18.60
103.111.225.18 36.229.150.102 138.22.181.147 9.32.0.113
24.189.62.134 201.210.178.33 83.152.171.60 152.198.217.137