Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.42.95.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.42.95.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032002 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 21 07:33:12 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 68.95.42.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.42.95.68.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
51.255.83.178 attackbotsspam
Jul  1 05:17:39 localhost sshd\[25167\]: Invalid user rabbitmq from 51.255.83.178 port 38852
Jul  1 05:17:39 localhost sshd\[25167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.83.178
...
2019-07-01 19:53:50
211.106.110.49 attackspam
Invalid user arma from 211.106.110.49 port 54197
2019-07-01 20:26:52
139.59.74.143 attack
Jul  1 12:15:16 MK-Soft-VM5 sshd\[30042\]: Invalid user zabbix from 139.59.74.143 port 58172
Jul  1 12:15:16 MK-Soft-VM5 sshd\[30042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.143
Jul  1 12:15:18 MK-Soft-VM5 sshd\[30042\]: Failed password for invalid user zabbix from 139.59.74.143 port 58172 ssh2
...
2019-07-01 20:21:05
92.255.195.228 attackbotsspam
Jul  1 03:37:00 mxgate1 postfix/postscreen[14511]: CONNECT from [92.255.195.228]:35666 to [176.31.12.44]:25
Jul  1 03:37:00 mxgate1 postfix/dnsblog[14514]: addr 92.255.195.228 listed by domain zen.spamhaus.org as 127.0.0.4
Jul  1 03:37:00 mxgate1 postfix/dnsblog[14514]: addr 92.255.195.228 listed by domain zen.spamhaus.org as 127.0.0.3
Jul  1 03:37:00 mxgate1 postfix/dnsblog[14515]: addr 92.255.195.228 listed by domain cbl.abuseat.org as 127.0.0.2
Jul  1 03:37:00 mxgate1 postfix/dnsblog[14512]: addr 92.255.195.228 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul  1 03:37:00 mxgate1 postfix/dnsblog[14513]: addr 92.255.195.228 listed by domain bl.spamcop.net as 127.0.0.2
Jul  1 03:37:00 mxgate1 postfix/dnsblog[14516]: addr 92.255.195.228 listed by domain b.barracudacentral.org as 127.0.0.2
Jul  1 03:37:00 mxgate1 postfix/postscreen[14511]: PREGREET 54 after 0.13 from [92.255.195.228]:35666: EHLO 92x255x195x228.static-customer.kzn.ertelecom.ru

Jul  1 03:37:00 mxgate1........
-------------------------------
2019-07-01 20:07:35
190.96.172.101 attackspambots
Brute force attempt
2019-07-01 20:02:16
162.252.58.70 attackbots
Jul  1 05:28:03 srv1 postfix/smtpd[5440]: connect from ns.ecodominio.com[162.252.58.70]
Jul x@x
Jul  1 05:28:09 srv1 postfix/smtpd[5440]: lost connection after RCPT from ns.ecodominio.com[162.252.58.70]
Jul  1 05:28:09 srv1 postfix/smtpd[5440]: disconnect from ns.ecodominio.com[162.252.58.70]
Jul  1 05:30:13 srv1 postfix/smtpd[3584]: connect from ns.ecodominio.com[162.252.58.70]
Jul x@x
Jul  1 05:30:19 srv1 postfix/smtpd[3584]: lost connection after RCPT from ns.ecodominio.com[162.252.58.70]
Jul  1 05:30:19 srv1 postfix/smtpd[3584]: disconnect from ns.ecodominio.com[162.252.58.70]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=162.252.58.70
2019-07-01 19:58:22
153.126.215.150 attackspam
Jul  1 13:29:37 giegler sshd[13103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.126.215.150
Jul  1 13:29:37 giegler sshd[13103]: Invalid user hekz from 153.126.215.150 port 53720
Jul  1 13:29:40 giegler sshd[13103]: Failed password for invalid user hekz from 153.126.215.150 port 53720 ssh2
Jul  1 13:31:26 giegler sshd[13130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.126.215.150  user=mysql
Jul  1 13:31:28 giegler sshd[13130]: Failed password for mysql from 153.126.215.150 port 34155 ssh2
2019-07-01 19:48:12
216.170.114.14 attackbots
Jul  1 05:30:47 admin sendmail[4958]: x613UkX0004958: [216.170.114.14] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Jul  1 05:30:47 admin sendmail[4959]: x613Ul5G004959: [216.170.114.14] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Jul  1 05:30:47 admin sendmail[4960]: x613UlnT004960: [216.170.114.14] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Jul  1 05:30:48 admin sendmail[4963]: x613UmT9004963: [216.170.114.14] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=216.170.114.14
2019-07-01 20:02:47
104.131.128.245 attack
[portscan] Port scan
2019-07-01 19:53:31
37.139.0.226 attackspam
2019-07-01T05:42:43.107802scmdmz1 sshd\[25528\]: Invalid user balance from 37.139.0.226 port 38498
2019-07-01T05:42:43.110802scmdmz1 sshd\[25528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.0.226
2019-07-01T05:42:44.662267scmdmz1 sshd\[25528\]: Failed password for invalid user balance from 37.139.0.226 port 38498 ssh2
...
2019-07-01 20:17:24
168.228.151.4 attack
libpam_shield report: forced login attempt
2019-07-01 20:06:22
165.227.97.108 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-01 20:08:50
152.249.225.17 attackspam
Jul  1 13:05:36 vserver sshd\[22357\]: Failed password for root from 152.249.225.17 port 50144 ssh2Jul  1 13:05:39 vserver sshd\[22357\]: Failed password for root from 152.249.225.17 port 50144 ssh2Jul  1 13:05:41 vserver sshd\[22357\]: Failed password for root from 152.249.225.17 port 50144 ssh2Jul  1 13:05:43 vserver sshd\[22357\]: Failed password for root from 152.249.225.17 port 50144 ssh2
...
2019-07-01 20:28:59
223.202.201.220 attack
$f2bV_matches
2019-07-01 20:13:26
171.25.193.20 attackbotsspam
Unauthorized access detected from banned ip
2019-07-01 20:32:15

Recently Reported IPs

14.65.37.47 118.193.56.229 237.237.153.98 157.254.62.101
237.5.220.176 20.86.58.29 127.23.135.223 225.16.48.18
19.78.111.235 48.203.43.140 157.55.39.60 59.229.118.14
53.228.179.228 213.228.119.95 41.73.190.179 197.129.52.197
167.99.28.249 112.213.116.170 167.99.28.125 23.18.209.42