Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.56.57.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.56.57.180.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 00:45:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 180.57.56.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.56.57.180.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.121.4.152 attackspambots
2020-09-07T18:52:29.879284cyberdyne sshd[88194]: Failed password for invalid user pi from 190.121.4.152 port 53990 ssh2
2020-09-07T18:52:28.161870cyberdyne sshd[88196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.121.4.152
2020-09-07T18:52:27.916424cyberdyne sshd[88196]: Invalid user pi from 190.121.4.152 port 53992
2020-09-07T18:52:29.914888cyberdyne sshd[88196]: Failed password for invalid user pi from 190.121.4.152 port 53992 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.121.4.152
2020-09-08 14:32:20
186.200.181.130 attackspam
Sep  8 02:55:45 pkdns2 sshd\[51836\]: Invalid user oracle from 186.200.181.130Sep  8 02:55:47 pkdns2 sshd\[51836\]: Failed password for invalid user oracle from 186.200.181.130 port 37834 ssh2Sep  8 02:59:56 pkdns2 sshd\[51990\]: Invalid user ts from 186.200.181.130Sep  8 02:59:59 pkdns2 sshd\[51990\]: Failed password for invalid user ts from 186.200.181.130 port 42480 ssh2Sep  8 03:04:06 pkdns2 sshd\[52239\]: Invalid user kharpern from 186.200.181.130Sep  8 03:04:08 pkdns2 sshd\[52239\]: Failed password for invalid user kharpern from 186.200.181.130 port 47114 ssh2
...
2020-09-08 14:15:21
213.230.110.107 attackbots
Sep  7 16:52:46 rush sshd[741]: Failed password for root from 213.230.110.107 port 44286 ssh2
Sep  7 16:52:57 rush sshd[741]: error: maximum authentication attempts exceeded for root from 213.230.110.107 port 44286 ssh2 [preauth]
Sep  7 16:53:01 rush sshd[743]: Failed password for root from 213.230.110.107 port 45322 ssh2
...
2020-09-08 14:14:52
5.190.81.105 attackspam
2020-09-07 02:41:53 plain_virtual_exim authenticator failed for ([5.190.81.105]) [5.190.81.105]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.190.81.105
2020-09-08 14:43:48
154.221.28.101 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-08 14:45:57
122.152.208.242 attackspambots
Sep  7 17:53:26 *** sshd[25237]: User root from 122.152.208.242 not allowed because not listed in AllowUsers
2020-09-08 14:15:53
159.226.170.253 attackspam
Sep  8 06:00:41 ns37 sshd[1408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.226.170.253
2020-09-08 14:14:03
202.129.41.94 attackspambots
Sep  7 18:51:59 ns382633 sshd\[9972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.41.94  user=root
Sep  7 18:52:02 ns382633 sshd\[9972\]: Failed password for root from 202.129.41.94 port 52040 ssh2
Sep  7 18:52:13 ns382633 sshd\[10018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.41.94  user=root
Sep  7 18:52:15 ns382633 sshd\[10018\]: Failed password for root from 202.129.41.94 port 53710 ssh2
Sep  7 18:52:37 ns382633 sshd\[10038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.41.94  user=root
2020-09-08 14:26:47
188.166.185.157 attack
failed root login
2020-09-08 14:16:48
114.5.103.178 attackspambots
Email rejected due to spam filtering
2020-09-08 14:11:10
94.102.57.137 attack
Sep  8 07:29:41 mail postfix/smtpd\[28561\]: warning: unknown\[94.102.57.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  8 07:36:47 mail postfix/smtpd\[28982\]: warning: unknown\[94.102.57.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  8 07:40:46 mail postfix/smtpd\[28821\]: warning: unknown\[94.102.57.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  8 08:14:36 mail postfix/smtpd\[30140\]: warning: unknown\[94.102.57.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-08 14:35:57
170.246.204.165 attackspam
Sep  7 11:52:32 mailman postfix/smtpd[13543]: warning: unknown[170.246.204.165]: SASL PLAIN authentication failed: authentication failure
2020-09-08 14:30:38
112.85.42.173 attackspam
Sep  8 08:19:38 router sshd[9772]: Failed password for root from 112.85.42.173 port 37444 ssh2
Sep  8 08:19:43 router sshd[9772]: Failed password for root from 112.85.42.173 port 37444 ssh2
Sep  8 08:19:47 router sshd[9772]: Failed password for root from 112.85.42.173 port 37444 ssh2
Sep  8 08:19:51 router sshd[9772]: Failed password for root from 112.85.42.173 port 37444 ssh2
...
2020-09-08 14:24:13
114.67.67.148 attackspam
2020-09-07T16:47:29.014259dmca.cloudsearch.cf sshd[19590]: Invalid user gpadmin from 114.67.67.148 port 45606
2020-09-07T16:47:29.020392dmca.cloudsearch.cf sshd[19590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.67.148
2020-09-07T16:47:29.014259dmca.cloudsearch.cf sshd[19590]: Invalid user gpadmin from 114.67.67.148 port 45606
2020-09-07T16:47:30.391181dmca.cloudsearch.cf sshd[19590]: Failed password for invalid user gpadmin from 114.67.67.148 port 45606 ssh2
2020-09-07T16:50:15.798317dmca.cloudsearch.cf sshd[19633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.67.148  user=root
2020-09-07T16:50:18.292980dmca.cloudsearch.cf sshd[19633]: Failed password for root from 114.67.67.148 port 46826 ssh2
2020-09-07T16:52:55.499816dmca.cloudsearch.cf sshd[19715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.67.148  user=root
2020-09-07T16:52:57.2
...
2020-09-08 14:19:11
186.154.234.165 attack
Unauthorized connection attempt from IP address 186.154.234.165 on Port 445(SMB)
2020-09-08 14:41:49

Recently Reported IPs

97.67.114.189 255.164.4.199 86.37.195.238 185.6.250.178
74.27.82.20 214.71.160.240 216.124.54.76 151.115.53.13
46.229.39.10 36.193.148.121 228.219.131.226 143.223.234.155
154.86.122.73 242.240.255.61 49.17.79.129 29.234.45.179
192.240.80.167 133.78.245.172 13.208.37.0 49.238.213.45