Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.40.129.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.40.129.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 19:46:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 136.129.40.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.40.129.136.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
188.247.65.179 attack
SSH Brute Force
2020-03-06 14:26:29
45.133.99.2 attackspambots
2020-03-06 06:07:03 dovecot_login authenticator failed for \(\[45.133.99.2\]\) \[45.133.99.2\]: 535 Incorrect authentication data \(set_id=hostmaster@opso.it\)
2020-03-06 06:07:12 dovecot_login authenticator failed for \(\[45.133.99.2\]\) \[45.133.99.2\]: 535 Incorrect authentication data
2020-03-06 06:07:24 dovecot_login authenticator failed for \(\[45.133.99.2\]\) \[45.133.99.2\]: 535 Incorrect authentication data
2020-03-06 06:07:30 dovecot_login authenticator failed for \(\[45.133.99.2\]\) \[45.133.99.2\]: 535 Incorrect authentication data
2020-03-06 06:07:44 dovecot_login authenticator failed for \(\[45.133.99.2\]\) \[45.133.99.2\]: 535 Incorrect authentication data
2020-03-06 14:58:23
110.12.8.10 attack
Mar  6 07:02:55 MK-Soft-Root1 sshd[20336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.12.8.10 
Mar  6 07:02:57 MK-Soft-Root1 sshd[20336]: Failed password for invalid user ftpuser from 110.12.8.10 port 56430 ssh2
...
2020-03-06 14:59:47
185.200.118.70 attackspambots
attempted connection to port 3128
2020-03-06 14:28:18
185.143.223.173 attackbotsspam
Mar  6 07:14:45 mail.srvfarm.net postfix/smtpd[1965344]: NOQUEUE: reject: RCPT from unknown[185.143.223.173]: 554 5.7.1 : Relay access denied; from=<1g1zxxm8ebnh@sintesapeninsulahotels.com> to= proto=ESMTP helo=<[185.143.223.170]>
Mar  6 07:14:45 mail.srvfarm.net postfix/smtpd[1965344]: NOQUEUE: reject: RCPT from unknown[185.143.223.173]: 554 5.7.1 : Relay access denied; from=<1g1zxxm8ebnh@sintesapeninsulahotels.com> to= proto=ESMTP helo=<[185.143.223.170]>
Mar  6 07:14:45 mail.srvfarm.net postfix/smtpd[1965344]: NOQUEUE: reject: RCPT from unknown[185.143.223.173]: 554 5.7.1 : Relay access denied; from=<1g1zxxm8ebnh@sintesapeninsulahotels.com> to= proto=ESMTP helo=<[185.143.223.170]>
Mar  6 07:14:45 mail.srvfarm.net postfix/smtpd[1965344]: NOQUEUE: reject: RCPT from unknown[185.143.223.173]: 554 5.7.1 
2020-03-06 14:37:39
175.101.117.8 attack
Mar  6 08:01:18 prox sshd[23427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.101.117.8 
Mar  6 08:01:19 prox sshd[23427]: Failed password for invalid user sh from 175.101.117.8 port 40768 ssh2
2020-03-06 15:06:01
180.87.224.207 attackbots
CMS (WordPress or Joomla) login attempt.
2020-03-06 15:09:52
178.154.171.126 attackbots
[Fri Mar 06 11:57:50.813479 2020] [:error] [pid 31020:tid 139856877369088] [client 178.154.171.126:41223] [client 178.154.171.126] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XmHYTnCflmAPk@m9WrMEJwAAAUo"]
...
2020-03-06 14:29:06
122.51.165.18 attackspam
2020-03-06T06:59:12.639182vps751288.ovh.net sshd\[5713\]: Invalid user hadoop from 122.51.165.18 port 58564
2020-03-06T06:59:12.645431vps751288.ovh.net sshd\[5713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.165.18
2020-03-06T06:59:14.324013vps751288.ovh.net sshd\[5713\]: Failed password for invalid user hadoop from 122.51.165.18 port 58564 ssh2
2020-03-06T07:03:48.112663vps751288.ovh.net sshd\[5757\]: Invalid user deploy from 122.51.165.18 port 53248
2020-03-06T07:03:48.118151vps751288.ovh.net sshd\[5757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.165.18
2020-03-06 14:50:01
93.171.136.161 attackspambots
SMB Server BruteForce Attack
2020-03-06 14:44:42
103.221.244.165 attack
Mar  6 07:17:56 vps691689 sshd[8955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.244.165
Mar  6 07:17:58 vps691689 sshd[8955]: Failed password for invalid user bugzilla from 103.221.244.165 port 54880 ssh2
...
2020-03-06 14:50:51
206.189.24.67 attackbotsspam
Mar  6 06:54:12 lukav-desktop sshd\[7109\]: Invalid user trlukanet from 206.189.24.67
Mar  6 06:54:12 lukav-desktop sshd\[7109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.24.67
Mar  6 06:54:14 lukav-desktop sshd\[7109\]: Failed password for invalid user trlukanet from 206.189.24.67 port 39210 ssh2
Mar  6 06:57:28 lukav-desktop sshd\[7176\]: Invalid user docslukanet from 206.189.24.67
Mar  6 06:57:28 lukav-desktop sshd\[7176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.24.67
2020-03-06 14:45:14
125.227.130.2 attackspam
Mar  6 08:13:58 takio sshd[1982]: Invalid user novogrow from 125.227.130.2 port 38313
Mar  6 08:17:52 takio sshd[2005]: Invalid user oracle from 125.227.130.2 port 26769
Mar  6 08:21:38 takio sshd[2037]: Invalid user oracle from 125.227.130.2 port 42463
2020-03-06 14:40:32
36.71.238.35 attackspam
20/3/5@23:56:52: FAIL: Alarm-Network address from=36.71.238.35
...
2020-03-06 15:07:50
222.186.175.217 attack
Mar  6 07:28:00 nextcloud sshd\[31185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Mar  6 07:28:02 nextcloud sshd\[31185\]: Failed password for root from 222.186.175.217 port 41682 ssh2
Mar  6 07:28:05 nextcloud sshd\[31185\]: Failed password for root from 222.186.175.217 port 41682 ssh2
2020-03-06 14:35:04

Recently Reported IPs

196.109.160.102 188.71.149.217 237.231.193.89 210.135.121.170
159.172.117.106 36.67.215.211 179.247.18.147 66.176.189.166
186.90.27.177 52.98.228.246 162.108.82.209 32.18.59.235
200.128.119.194 136.138.23.227 230.223.185.162 117.11.229.39
240.69.12.20 237.166.155.203 97.88.232.188 31.215.84.176