Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.66.187.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.66.187.54.			IN	A

;; AUTHORITY SECTION:
.			157	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052700 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 27 16:21:52 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 54.187.66.55.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
server can't find 55.66.187.54.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
184.82.25.99 attackbotsspam
445/tcp
[2019-06-21]1pkt
2019-06-22 05:40:02
60.189.239.17 attack
5500/tcp
[2019-06-21]1pkt
2019-06-22 05:58:29
123.125.71.113 attackspam
Bad bot/spoofed identity
2019-06-22 05:43:57
86.57.138.40 attackbots
Request: "GET / HTTP/1.1" Request: "GET /HNAP1/ HTTP/1.1"
2019-06-22 05:50:33
66.199.246.2 attack
Jun 19 05:50:49 srv1 sshd[29326]: reveeclipse mapping checking getaddrinfo for kps.hosting.inspirations.net [66.199.246.2] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 19 05:50:49 srv1 sshd[29326]: Invalid user kimonda from 66.199.246.2
Jun 19 05:50:49 srv1 sshd[29326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.199.246.2 
Jun 19 05:50:51 srv1 sshd[29326]: Failed password for invalid user kimonda from 66.199.246.2 port 55278 ssh2
Jun 19 05:50:51 srv1 sshd[29326]: Received disconnect from 66.199.246.2: 11: Bye Bye [preauth]
Jun 19 05:55:13 srv1 sshd[29704]: reveeclipse mapping checking getaddrinfo for kps.hosting.inspirations.net [66.199.246.2] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 19 05:55:13 srv1 sshd[29704]: Invalid user test from 66.199.246.2
Jun 19 05:55:13 srv1 sshd[29704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.199.246.2 
Jun 19 05:55:15 srv1 sshd[29704]: Failed passwo........
-------------------------------
2019-06-22 05:49:18
187.56.238.132 attack
Request: "GET / HTTP/1.1"
2019-06-22 05:52:01
179.186.246.14 attackspam
DATE:2019-06-21_21:44:35, IP:179.186.246.14, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-22 05:59:00
110.172.170.142 attack
445/tcp
[2019-06-21]1pkt
2019-06-22 06:00:47
179.99.171.84 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:02:33
165.22.143.229 attack
web-1 [ssh] SSH Attack
2019-06-22 05:37:02
180.241.36.113 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 05:48:06
190.79.4.37 attackspambots
445/tcp 445/tcp
[2019-06-21]2pkt
2019-06-22 05:31:28
89.252.172.164 attackspambots
SASL Brute Force
2019-06-22 05:56:40
107.170.202.120 attack
Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x"
2019-06-22 05:23:00
42.116.174.50 attack
9527/tcp 9527/tcp 9527/tcp
[2019-06-21]3pkt
2019-06-22 05:27:59

Recently Reported IPs

93.145.128.218 11.222.158.61 195.68.221.180 111.132.195.68
144.5.239.111 36.147.252.1 103.219.28.81 72.168.0.106
185.62.184.44 224.252.42.198 12.120.175.233 193.26.97.176
168.230.252.162 232.35.222.52 251.96.105.129 26.241.190.191
231.67.235.110 156.33.73.40 53.53.42.182 79.196.0.222