Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.68.138.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.68.138.241.			IN	A

;; AUTHORITY SECTION:
.			136	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 10:51:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 241.138.68.55.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 55.68.138.241.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
115.79.125.154 attack
Port probing on unauthorized port 23
2020-02-26 10:33:35
187.59.65.80 attackbots
Automatic report - Port Scan Attack
2020-02-26 10:53:43
143.202.136.51 attack
Sending SPAM email
2020-02-26 10:40:39
122.51.203.207 attackbots
Feb 26 01:36:18 IngegnereFirenze sshd[11113]: Failed password for invalid user ftpuser from 122.51.203.207 port 37092 ssh2
...
2020-02-26 10:20:52
14.116.222.207 attackbots
RDP Bruteforce
2020-02-26 10:36:32
41.41.10.21 attackbots
kp-sea2-01 recorded 2 login violations from 41.41.10.21 and was blocked at 2020-02-26 00:45:20. 41.41.10.21 has been blocked on 0 previous occasions. 41.41.10.21's first attempt was recorded at 2020-02-26 00:45:20
2020-02-26 10:28:18
209.11.168.73 attack
Feb 25 21:45:06 ws19vmsma01 sshd[176245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.11.168.73
Feb 25 21:45:09 ws19vmsma01 sshd[176245]: Failed password for invalid user rebecca from 209.11.168.73 port 60277 ssh2
...
2020-02-26 10:41:56
79.101.58.43 attackbotsspam
GPON Home Routers Remote Code Execution Vulnerability
2020-02-26 10:29:45
185.2.4.27 attack
GET /wp/wp-admin/ 404
2020-02-26 10:43:51
113.160.178.148 attackspambots
Invalid user test from 113.160.178.148 port 44998
2020-02-26 10:18:43
154.92.14.248 attackspambots
$f2bV_matches
2020-02-26 10:23:54
106.12.49.150 attackspam
"SSH brute force auth login attempt."
2020-02-26 10:54:57
180.243.123.8 attackspam
20/2/25@19:45:18: FAIL: Alarm-Network address from=180.243.123.8
20/2/25@19:45:19: FAIL: Alarm-Network address from=180.243.123.8
...
2020-02-26 10:30:27
113.161.198.48 attackspambots
Unauthorized connection attempt from IP address 113.161.198.48 on Port 445(SMB)
2020-02-26 10:25:18
45.95.55.45 attack
2020-02-26T02:49:30.855276vps751288.ovh.net sshd\[30510\]: Invalid user yuanshishi from 45.95.55.45 port 53672
2020-02-26T02:49:30.868517vps751288.ovh.net sshd\[30510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.55.45
2020-02-26T02:49:33.176183vps751288.ovh.net sshd\[30510\]: Failed password for invalid user yuanshishi from 45.95.55.45 port 53672 ssh2
2020-02-26T02:50:13.933187vps751288.ovh.net sshd\[30512\]: Invalid user budget from 45.95.55.45 port 32808
2020-02-26T02:50:13.940916vps751288.ovh.net sshd\[30512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.55.45
2020-02-26 10:48:25

Recently Reported IPs

95.212.98.207 4.132.10.213 226.88.9.78 114.55.171.138
114.55.18.189 114.55.185.1 114.55.188.172 93.121.152.238
114.55.224.232 114.55.226.215 203.116.112.31 114.55.228.116
114.55.255.197 114.55.255.225 50.97.250.61 114.55.36.214
114.55.36.252 114.55.41.8 219.125.23.172 114.55.42.97