Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Elroy

Region: Wisconsin

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.94.28.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;55.94.28.149.			IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061801 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 19 08:35:32 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 149.28.94.55.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.28.94.55.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.74.143 attackbots
Jul 17 23:07:41 icinga sshd[15209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.143
Jul 17 23:07:43 icinga sshd[15209]: Failed password for invalid user web1 from 139.59.74.143 port 43898 ssh2
...
2019-07-18 05:24:36
134.73.129.142 attack
Jul 17 18:29:08 [munged] sshd[5777]: Invalid user alin from 134.73.129.142 port 49034
Jul 17 18:29:08 [munged] sshd[5777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.142
2019-07-18 05:23:15
185.94.192.91 attackbots
1,52-00/00 concatform PostRequest-Spammer scoring: maputo01_x2b
2019-07-18 05:10:06
59.1.48.98 attackbots
Jul 17 17:07:57 vps200512 sshd\[12435\]: Invalid user suporte from 59.1.48.98
Jul 17 17:07:57 vps200512 sshd\[12435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.1.48.98
Jul 17 17:07:59 vps200512 sshd\[12435\]: Failed password for invalid user suporte from 59.1.48.98 port 45801 ssh2
Jul 17 17:13:28 vps200512 sshd\[12609\]: Invalid user iview from 59.1.48.98
Jul 17 17:13:28 vps200512 sshd\[12609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.1.48.98
2019-07-18 05:21:34
106.13.74.47 attackspambots
vps1:sshd-InvalidUser
2019-07-18 05:30:07
154.73.75.99 attack
Jul 17 13:41:56 vtv3 sshd\[10981\]: Invalid user kevin from 154.73.75.99 port 16621
Jul 17 13:41:56 vtv3 sshd\[10981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.75.99
Jul 17 13:41:58 vtv3 sshd\[10981\]: Failed password for invalid user kevin from 154.73.75.99 port 16621 ssh2
Jul 17 13:48:23 vtv3 sshd\[14421\]: Invalid user pilot from 154.73.75.99 port 17845
Jul 17 13:48:23 vtv3 sshd\[14421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.75.99
Jul 17 14:01:45 vtv3 sshd\[21329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.75.99  user=root
Jul 17 14:01:47 vtv3 sshd\[21329\]: Failed password for root from 154.73.75.99 port 37397 ssh2
Jul 17 14:08:21 vtv3 sshd\[24728\]: Invalid user jboss from 154.73.75.99 port 28914
Jul 17 14:08:21 vtv3 sshd\[24728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.75.
2019-07-18 04:51:16
49.88.112.61 attackspambots
Brute force attempt
2019-07-18 04:46:59
121.142.111.86 attackspambots
2019-07-18T02:28:44.531845luisaranguren sshd[3766]: Connection from 121.142.111.86 port 52940 on 10.10.10.6 port 22
2019-07-18T02:28:59.249345luisaranguren sshd[3766]: Invalid user oracle from 121.142.111.86 port 52940
2019-07-18T02:28:59.256435luisaranguren sshd[3766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.111.86
2019-07-18T02:28:44.531845luisaranguren sshd[3766]: Connection from 121.142.111.86 port 52940 on 10.10.10.6 port 22
2019-07-18T02:28:59.249345luisaranguren sshd[3766]: Invalid user oracle from 121.142.111.86 port 52940
2019-07-18T02:29:01.289900luisaranguren sshd[3766]: Failed password for invalid user oracle from 121.142.111.86 port 52940 ssh2
...
2019-07-18 05:26:21
106.75.17.91 attackbotsspam
Invalid user roman from 106.75.17.91 port 41114
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.17.91
Failed password for invalid user roman from 106.75.17.91 port 41114 ssh2
Invalid user tim from 106.75.17.91 port 39244
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.17.91
2019-07-18 05:19:58
79.130.181.215 attackbotsspam
Automatic report - Port Scan Attack
2019-07-18 05:20:31
61.191.252.218 attackspambots
Brute force attempt
2019-07-18 05:04:21
51.89.17.237 attackbotsspam
17.07.2019 16:33:11 Connection to port 5060 blocked by firewall
2019-07-18 04:49:17
209.159.151.134 attackbots
[ ?‍☠️ ][ ?? ] REQUEST: /vtigercrm/vtigerservice.php
2019-07-18 05:09:30
202.29.39.1 attack
Jul 17 02:37:26 *** sshd[8284]: Failed password for invalid user carshowguide from 202.29.39.1 port 33400 ssh2
2019-07-18 05:16:32
103.99.75.171 attackspambots
Unauthorized connection attempt from IP address 103.99.75.171 on Port 445(SMB)
2019-07-18 04:46:29

Recently Reported IPs

63.157.53.99 221.19.209.40 108.15.77.102 203.54.111.60
124.207.134.181 68.0.238.30 75.113.210.7 99.198.137.135
119.252.85.35 105.99.221.194 196.233.189.207 194.111.237.255
113.64.191.247 5.18.220.254 94.71.2.78 200.111.100.197
98.94.46.72 85.103.141.32 103.217.89.24 118.130.187.44