Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.53.60.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.53.60.138.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 22:34:07 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 138.60.53.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.53.60.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
69.30.252.62 attack
Forced List Spam
2020-04-18 04:06:41
92.118.161.49 attackbotsspam
04/17/2020-15:23:29.332275 92.118.161.49 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-18 04:16:27
39.129.23.23 attackbots
Apr 17 19:20:34 powerpi2 sshd[6272]: Invalid user mj from 39.129.23.23 port 53594
Apr 17 19:20:36 powerpi2 sshd[6272]: Failed password for invalid user mj from 39.129.23.23 port 53594 ssh2
Apr 17 19:23:22 powerpi2 sshd[6460]: Invalid user pe from 39.129.23.23 port 39834
...
2020-04-18 04:19:35
220.76.205.35 attackspam
(sshd) Failed SSH login from 220.76.205.35 (-): 5 in the last 3600 secs
2020-04-18 04:03:24
13.65.201.223 attackbots
HTTP Target[80] Remote Code Execution Detection ..
2020-04-18 04:38:58
187.18.108.73 attackbotsspam
SSH Brute Force
2020-04-18 04:23:18
206.189.128.215 attackbots
SSH Brute Force
2020-04-18 04:16:43
192.241.238.37 attack
Port Scan: Events[1] countPorts[1]: 514 ..
2020-04-18 04:04:37
137.74.206.80 attackspambots
WordPress wp-login brute force :: 137.74.206.80 0.124 BYPASS [17/Apr/2020:19:23:02  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-18 04:43:54
179.124.34.9 attackspam
Apr 17 20:31:31 *** sshd[15323]: Invalid user cr from 179.124.34.9
2020-04-18 04:41:18
122.51.93.233 attackspambots
Apr 17 21:16:03 MainVPS sshd[23084]: Invalid user ov from 122.51.93.233 port 57154
Apr 17 21:16:03 MainVPS sshd[23084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.93.233
Apr 17 21:16:03 MainVPS sshd[23084]: Invalid user ov from 122.51.93.233 port 57154
Apr 17 21:16:06 MainVPS sshd[23084]: Failed password for invalid user ov from 122.51.93.233 port 57154 ssh2
Apr 17 21:23:27 MainVPS sshd[29469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.93.233  user=root
Apr 17 21:23:29 MainVPS sshd[29469]: Failed password for root from 122.51.93.233 port 34418 ssh2
...
2020-04-18 04:14:51
177.129.203.118 attack
SSH Brute-Force attacks
2020-04-18 04:35:06
50.236.44.26 attack
Automatic report - Port Scan Attack
2020-04-18 04:28:56
123.122.110.79 attack
SSH Brute-Force reported by Fail2Ban
2020-04-18 04:06:07
192.64.113.120 attackspambots
Port Scan: Events[1] countPorts[1]: 5060 ..
2020-04-18 04:15:56

Recently Reported IPs

24.178.97.8 40.155.69.224 5.144.186.245 66.48.240.172
89.248.247.35 246.74.178.186 201.199.249.122 234.244.167.120
186.14.195.212 248.232.170.71 30.126.234.29 229.235.87.244
184.204.189.101 168.23.56.15 76.68.19.235 137.164.151.184
62.178.94.191 49.9.218.225 27.96.208.97 151.169.10.235